Pin Chrome's shortcut to the Win10 Start menu on install and OS upgrade.
[chromium-blink-merge.git] / sandbox / win / src / interception_agent.h
blob2762c611fd947884110076ef192b9750adc1027e
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 // Defines InterceptionAgent, the class in charge of setting up interceptions
6 // from the inside of the sandboxed process. For more details see
7 // http://dev.chromium.org/developers/design-documents/sandbox .
9 #ifndef SANDBOX_SRC_INTERCEPTION_AGENT_H__
10 #define SANDBOX_SRC_INTERCEPTION_AGENT_H__
12 #include "base/basictypes.h"
13 #include "sandbox/win/src/nt_internals.h"
14 #include "sandbox/win/src/sandbox_types.h"
16 namespace sandbox {
18 // Internal structures used for communication between the broker and the target.
19 struct DllInterceptionData;
20 struct SharedMemory;
21 struct DllPatchInfo;
23 class ResolverThunk;
25 // The InterceptionAgent executes on the target application, and it is in charge
26 // of setting up the desired interceptions or indicating what module needs to
27 // be unloaded.
29 // The exposed API consists of three methods: GetInterceptionAgent to retrieve
30 // the single class instance, OnDllLoad and OnDllUnload to process a dll being
31 // loaded and unloaded respectively.
33 // This class assumes that it will get called for every dll being loaded,
34 // starting with kernel32, so the singleton will be instantiated from within the
35 // loader lock.
36 class InterceptionAgent {
37 public:
38 // Returns the single InterceptionAgent object for this process.
39 static InterceptionAgent* GetInterceptionAgent();
41 // This method should be invoked whenever a new dll is loaded to perform the
42 // required patches. If the return value is false, this dll should not be
43 // allowed to load.
45 // full_path is the (optional) full name of the module being loaded and name
46 // is the internal module name. If full_path is provided, it will be used
47 // before the internal name to determine if we care about this dll.
48 bool OnDllLoad(const UNICODE_STRING* full_path, const UNICODE_STRING* name,
49 void* base_address);
51 // Performs cleanup when a dll is unloaded.
52 void OnDllUnload(void* base_address);
54 private:
55 ~InterceptionAgent() {}
57 // Performs initialization of the singleton.
58 bool Init(SharedMemory* shared_memory);
60 // Returns true if we are interested on this dll. dll_info is an entry of the
61 // list of intercepted dlls.
62 bool DllMatch(const UNICODE_STRING* full_path, const UNICODE_STRING* name,
63 const DllPatchInfo* dll_info);
65 // Performs the patching of the dll loaded at base_address.
66 // The patches to perform are described on dll_info, and thunks is the thunk
67 // storage for the whole dll.
68 // Returns true on success.
69 bool PatchDll(const DllPatchInfo* dll_info, DllInterceptionData* thunks);
71 // Returns a resolver for a given interception type.
72 ResolverThunk* GetResolver(InterceptionType type);
74 // Shared memory containing the list of functions to intercept.
75 SharedMemory* interceptions_;
77 // Array of thunk data buffers for the intercepted dlls. This object singleton
78 // is allocated with a placement new with enough space to hold the complete
79 // array of pointers, not just the first element.
80 DllInterceptionData* dlls_[1];
82 DISALLOW_IMPLICIT_CONSTRUCTORS(InterceptionAgent);
85 } // namespace sandbox
87 #endif // SANDBOX_SRC_INTERCEPTION_AGENT_H__