Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
michael@0 | 2 | // Use of this source code is governed by a BSD-style license that can be |
michael@0 | 3 | // found in the LICENSE file. |
michael@0 | 4 | |
michael@0 | 5 | #ifndef SANDBOX_SRC_PROCESS_THREAD_DISPATCHER_H_ |
michael@0 | 6 | #define SANDBOX_SRC_PROCESS_THREAD_DISPATCHER_H_ |
michael@0 | 7 | |
michael@0 | 8 | #include "base/basictypes.h" |
michael@0 | 9 | #include "sandbox/win/src/crosscall_server.h" |
michael@0 | 10 | #include "sandbox/win/src/sandbox_policy_base.h" |
michael@0 | 11 | |
michael@0 | 12 | namespace sandbox { |
michael@0 | 13 | |
michael@0 | 14 | // This class handles process and thread-related IPC calls. |
michael@0 | 15 | class ThreadProcessDispatcher : public Dispatcher { |
michael@0 | 16 | public: |
michael@0 | 17 | explicit ThreadProcessDispatcher(PolicyBase* policy_base); |
michael@0 | 18 | ~ThreadProcessDispatcher() {} |
michael@0 | 19 | |
michael@0 | 20 | // Dispatcher interface. |
michael@0 | 21 | virtual bool SetupService(InterceptionManager* manager, int service); |
michael@0 | 22 | |
michael@0 | 23 | private: |
michael@0 | 24 | // Processes IPC requests coming from calls to NtOpenThread() in the target. |
michael@0 | 25 | bool NtOpenThread(IPCInfo* ipc, DWORD desired_access, DWORD thread_id); |
michael@0 | 26 | |
michael@0 | 27 | // Processes IPC requests coming from calls to NtOpenProcess() in the target. |
michael@0 | 28 | bool NtOpenProcess(IPCInfo* ipc, DWORD desired_access, DWORD process_id); |
michael@0 | 29 | |
michael@0 | 30 | // Processes IPC requests from calls to NtOpenProcessToken() in the target. |
michael@0 | 31 | bool NtOpenProcessToken(IPCInfo* ipc, HANDLE process, DWORD desired_access); |
michael@0 | 32 | |
michael@0 | 33 | // Processes IPC requests from calls to NtOpenProcessTokenEx() in the target. |
michael@0 | 34 | bool NtOpenProcessTokenEx(IPCInfo* ipc, HANDLE process, DWORD desired_access, |
michael@0 | 35 | DWORD attributes); |
michael@0 | 36 | |
michael@0 | 37 | // Processes IPC requests coming from calls to CreateProcessW() in the target. |
michael@0 | 38 | bool CreateProcessW(IPCInfo* ipc, std::wstring* name, std::wstring* cmd_line, |
michael@0 | 39 | std::wstring* cur_dir, CountedBuffer* info); |
michael@0 | 40 | |
michael@0 | 41 | PolicyBase* policy_base_; |
michael@0 | 42 | DISALLOW_COPY_AND_ASSIGN(ThreadProcessDispatcher); |
michael@0 | 43 | }; |
michael@0 | 44 | |
michael@0 | 45 | } // namespace sandbox |
michael@0 | 46 | |
michael@0 | 47 | #endif // SANDBOX_SRC_PROCESS_THREAD_DISPATCHER_H_ |