no bug - fx doc: update info about blocking DLLs that load via window hook r=yjuglaret DONTBUILD

Differential Revision: https://phabricator.services.mozilla.com/D174906
This commit is contained in:
Greg Stoll 2023-04-07 10:54:17 +00:00
Родитель 6f8cf173f3
Коммит d68a388209
1 изменённых файлов: 6 добавлений и 2 удалений

Просмотреть файл

@ -208,8 +208,12 @@ As our blocklist works as explained above, there are the cases where we should n
| Blocking this type of module blocks even a process from launching. You may be able to block this type of module with RedirectToNoOpEntryPoint.
- | A module is loaded as a `Layered Service Provider <https://docs.microsoft.com/en-us/windows/win32/winsock/categorizing-layered-service-providers-and-applications>`_
| Blocking this type of module on Windows 8 or newer breaks networking. Blocking a LSP on Windows 7 is ok.
- | A module is loaded via a `Window hook <https://docs.microsoft.com/en-us/windows/win32/winmsg/hooks>`_
| Blocking this type of module causes repetitive attempts to load a module, resulting in slow performance like `Bug 1633718 <https://bugzilla.mozilla.org/show_bug.cgi?id=1633718>`_.
(we used to have to avoid blocking modules loaded via a
`Window hook <https://docs.microsoft.com/en-us/windows/win32/winmsg/hooks>`_ because blocking this type of
module would cause repetitive attempts to load a module, resulting in slow performance
like `Bug 1633718 <https://bugzilla.mozilla.org/show_bug.cgi?id=1633718>`_, but this should be fixed
as of `Bug 1823412 <https://bugzilla.mozilla.org/show_bug.cgi?id=1823412>`_.)
Third-party-module ping
-----------------------