Index: chrome_elf/blacklist/blacklist_interceptions.h |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.h b/chrome_elf/blacklist/blacklist_interceptions.h |
deleted file mode 100644 |
index 2ee96b475f8d21a3df79e9095b4bcd4f413f9427..0000000000000000000000000000000000000000 |
--- a/chrome_elf/blacklist/blacklist_interceptions.h |
+++ /dev/null |
@@ -1,43 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
-#define CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
- |
-#include "sandbox/win/src/nt_internals.h" |
-#include "sandbox/win/src/sandbox_types.h" |
- |
-namespace blacklist { |
- |
-bool InitializeInterceptImports(); |
- |
-// Interception of NtMapViewOfSection within the current process. |
-// It should never be called directly. This function provides the means to |
-// detect dlls being loaded, so we can patch them if needed. |
-SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( |
- NtMapViewOfSectionFunction orig_MapViewOfSection, |
- HANDLE section, |
- HANDLE process, |
- PVOID *base, |
- ULONG_PTR zero_bits, |
- SIZE_T commit_size, |
- PLARGE_INTEGER offset, |
- PSIZE_T view_size, |
- SECTION_INHERIT inherit, |
- ULONG allocation_type, |
- ULONG protect); |
- |
-#if defined(_WIN64) |
-// Interception of NtMapViewOfSection within the current process. |
-// It should never be called directly. This function provides the means to |
-// detect dlls being loaded, so we can patch them if needed. |
-SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection64( |
- HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, |
- SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, |
- SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect); |
-#endif |
- |
-} // namespace blacklist |
- |
-#endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |