| // Copyright 2014 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |
| #define SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |
| |
| #include "base/memory/raw_ptr.h" |
| #include "base/synchronization/lock.h" |
| #include "sandbox/win/src/crosscall_server.h" |
| #include "sandbox/win/src/ipc_tags.h" |
| #include "sandbox/win/src/sandbox_policy_base.h" |
| |
| namespace sandbox { |
| |
| // This class sets up intercepts for the Win32K lockdown policy. |
| class ProcessMitigationsWin32KDispatcher : public Dispatcher { |
| public: |
| explicit ProcessMitigationsWin32KDispatcher(PolicyBase* policy_base); |
| |
| ProcessMitigationsWin32KDispatcher( |
| const ProcessMitigationsWin32KDispatcher&) = delete; |
| ProcessMitigationsWin32KDispatcher& operator=( |
| const ProcessMitigationsWin32KDispatcher&) = delete; |
| |
| ~ProcessMitigationsWin32KDispatcher() override; |
| |
| // Dispatcher interface. |
| bool SetupService(InterceptionManager* manager, IpcTag service) override; |
| |
| private: |
| raw_ptr<PolicyBase> policy_base_; |
| }; |
| |
| } // namespace sandbox |
| |
| #endif // SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |