Chromium Code Reviews| Index: chrome_elf/blacklist/blacklist_interceptions.h |
| diff --git a/chrome_elf/blacklist/blacklist_interceptions.h b/chrome_elf/blacklist/blacklist_interceptions.h |
| index dfb4495c4131713f7f5e8e57b62f3509627f8a02..bc8144c132832d4022dee6f2ccac1a910f845769 100644 |
| --- a/chrome_elf/blacklist/blacklist_interceptions.h |
| +++ b/chrome_elf/blacklist/blacklist_interceptions.h |
| @@ -10,6 +10,8 @@ |
| namespace blacklist { |
| +extern NtMapViewOfSectionFunction g_nt_map_view_of_section_func; |
| + |
| bool InitializeInterceptImports(); |
| // Interception of NtMapViewOfSection within the current process. |
| @@ -28,6 +30,14 @@ SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( |
| ULONG allocation_type, |
| ULONG protect); |
| +// Interception of NtMapViewOfSection on the child process. |
|
robertshield
2014/01/07 18:30:47
s/on the child process/within the current process/
csharp
2014/01/07 20:43:07
Done.
|
| +// It should never be called directly. This function provides the means to |
| +// detect dlls being loaded, so we can patch them if needed. |
| +SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection64( |
|
robertshield
2014/01/07 18:30:47
#if defined(_WIN64)
csharp
2014/01/07 20:43:07
Done.
|
| + HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, |
| + SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, |
| + SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect); |
| + |
| } // namespace blacklist |
| #endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |