| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
| #define CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |
| |
| #include "sandbox/win/src/nt_internals.h" |
| #include "sandbox/win/src/sandbox_types.h" |
| |
| namespace blacklist { |
| |
| bool InitializeInterceptImports(); |
| |
| // Interception of NtMapViewOfSection within the current process. |
| // It should never be called directly. This function provides the means to |
| // detect dlls being loaded, so we can patch them if needed. |
| SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( |
| NtMapViewOfSectionFunction orig_MapViewOfSection, |
| HANDLE section, |
| HANDLE process, |
| PVOID *base, |
| ULONG_PTR zero_bits, |
| SIZE_T commit_size, |
| PLARGE_INTEGER offset, |
| PSIZE_T view_size, |
| SECTION_INHERIT inherit, |
| ULONG allocation_type, |
| ULONG protect); |
| |
| #if defined(_WIN64) |
| // Interception of NtMapViewOfSection within the current process. |
| // It should never be called directly. This function provides the means to |
| // detect dlls being loaded, so we can patch them if needed. |
| SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection64( |
| HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, |
| SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, |
| SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect); |
| #endif |
| |
| } // namespace blacklist |
| |
| #endif // CHROME_ELF_BLACKLIST_BLACKLIST_INTERCEPTIONS_H_ |