Index: chrome_elf/blacklist/blacklist_interceptions.h |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.h b/chrome_elf/blacklist/blacklist_interceptions.h |
index dfb4495c4131713f7f5e8e57b62f3509627f8a02..9d1f7e7bc5423ca7688db52f6900ce4872b39738 100644 |
--- a/chrome_elf/blacklist/blacklist_interceptions.h |
+++ b/chrome_elf/blacklist/blacklist_interceptions.h |
@@ -10,6 +10,10 @@ |
namespace blacklist { |
+#if defined(_WIN64) |
+extern NtMapViewOfSectionFunction g_nt_map_view_of_section_func; |
+#endif |
+ |
bool InitializeInterceptImports(); |
// Interception of NtMapViewOfSection within the current process. |
@@ -28,6 +32,16 @@ SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( |
ULONG allocation_type, |
ULONG protect); |
+#if defined(_WIN64) |
+// Interception of NtMapViewOfSection within the current process. |
+// It should never be called directly. This function provides the means to |
+// detect dlls being loaded, so we can patch them if needed. |
+SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection64( |
+ HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, |
+ SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, |
+ SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect); |
+#endif |
+ |
} // namespace blacklist |
#endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |