| Index: chrome_elf/blacklist/blacklist_interceptions.h
|
| diff --git a/chrome_elf/blacklist/blacklist_interceptions.h b/chrome_elf/blacklist/blacklist_interceptions.h
|
| index dfb4495c4131713f7f5e8e57b62f3509627f8a02..9d1f7e7bc5423ca7688db52f6900ce4872b39738 100644
|
| --- a/chrome_elf/blacklist/blacklist_interceptions.h
|
| +++ b/chrome_elf/blacklist/blacklist_interceptions.h
|
| @@ -10,6 +10,10 @@
|
|
|
| namespace blacklist {
|
|
|
| +#if defined(_WIN64)
|
| +extern NtMapViewOfSectionFunction g_nt_map_view_of_section_func;
|
| +#endif
|
| +
|
| bool InitializeInterceptImports();
|
|
|
| // Interception of NtMapViewOfSection within the current process.
|
| @@ -28,6 +32,16 @@ SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection(
|
| ULONG allocation_type,
|
| ULONG protect);
|
|
|
| +#if defined(_WIN64)
|
| +// Interception of NtMapViewOfSection within the current process.
|
| +// It should never be called directly. This function provides the means to
|
| +// detect dlls being loaded, so we can patch them if needed.
|
| +SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection64(
|
| + HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits,
|
| + SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size,
|
| + SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect);
|
| +#endif
|
| +
|
| } // namespace blacklist
|
|
|
| #endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_
|
|
|