Index: chrome_elf/blacklist/blacklist_interceptions.h |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.h b/chrome_elf/blacklist/blacklist_interceptions.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..dfb4495c4131713f7f5e8e57b62f3509627f8a02 |
--- /dev/null |
+++ b/chrome_elf/blacklist/blacklist_interceptions.h |
@@ -0,0 +1,33 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
+#define CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
+ |
+#include "sandbox/win/src/nt_internals.h" |
+#include "sandbox/win/src/sandbox_types.h" |
+ |
+namespace blacklist { |
+ |
+bool InitializeInterceptImports(); |
+ |
+// Interception of NtMapViewOfSection within the current process. |
+// It should never be called directly. This function provides the means to |
+// detect dlls being loaded, so we can patch them if needed. |
+SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( |
+ NtMapViewOfSectionFunction orig_MapViewOfSection, |
+ HANDLE section, |
+ HANDLE process, |
+ PVOID *base, |
+ ULONG_PTR zero_bits, |
+ SIZE_T commit_size, |
+ PLARGE_INTEGER offset, |
+ PSIZE_T view_size, |
+ SECTION_INHERIT inherit, |
+ ULONG allocation_type, |
+ ULONG protect); |
+ |
+} // namespace blacklist |
+ |
+#endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |