| Index: sandbox/win/src/target_interceptions.h
|
| diff --git a/sandbox/win/src/target_interceptions.h b/sandbox/win/src/target_interceptions.h
|
| deleted file mode 100644
|
| index f4805fec5cad5adfcf6180e73ff741056d7db4ea..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/target_interceptions.h
|
| +++ /dev/null
|
| @@ -1,35 +0,0 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/win/src/nt_internals.h"
|
| -#include "sandbox/win/src/sandbox_types.h"
|
| -
|
| -#ifndef SANDBOX_SRC_TARGET_INTERCEPTIONS_H__
|
| -#define SANDBOX_SRC_TARGET_INTERCEPTIONS_H__
|
| -
|
| -namespace sandbox {
|
| -
|
| -extern "C" {
|
| -
|
| -// Interception of NtMapViewOfSection on the child process.
|
| -// It should never be called directly. This function provides the means to
|
| -// detect dlls being loaded, so we can patch them if needed.
|
| -SANDBOX_INTERCEPT NTSTATUS WINAPI TargetNtMapViewOfSection(
|
| - NtMapViewOfSectionFunction orig_MapViewOfSection, HANDLE section,
|
| - HANDLE process, PVOID *base, ULONG_PTR zero_bits, SIZE_T commit_size,
|
| - PLARGE_INTEGER offset, PSIZE_T view_size, SECTION_INHERIT inherit,
|
| - ULONG allocation_type, ULONG protect);
|
| -
|
| -// Interception of NtUnmapViewOfSection on the child process.
|
| -// It should never be called directly. This function provides the means to
|
| -// detect dlls being unloaded, so we can clean up our interceptions.
|
| -SANDBOX_INTERCEPT NTSTATUS WINAPI TargetNtUnmapViewOfSection(
|
| - NtUnmapViewOfSectionFunction orig_UnmapViewOfSection, HANDLE process,
|
| - PVOID base);
|
| -
|
| -} // extern "C"
|
| -
|
| -} // namespace sandbox
|
| -
|
| -#endif // SANDBOX_SRC_TARGET_INTERCEPTIONS_H__
|
|
|