зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1460022: Part 8 - Update DLL blocklist to work with revised DLL interceptor interface; r=mhowell
--HG-- extra : rebase_source : 04e2f3c3ea6916f43e54a7f8c992f6cbb4fb3286
This commit is contained in:
Родитель
cc80cb14e0
Коммит
ecd4916dce
|
@ -90,14 +90,14 @@ printf_stderr(const char *fmt, ...)
|
|||
|
||||
|
||||
typedef MOZ_NORETURN_PTR void (__fastcall* BaseThreadInitThunk_func)(BOOL aIsInitialThread, void* aStartAddress, void* aThreadParam);
|
||||
static BaseThreadInitThunk_func stub_BaseThreadInitThunk = nullptr;
|
||||
static WindowsDllInterceptor::FuncHookType<BaseThreadInitThunk_func> stub_BaseThreadInitThunk;
|
||||
|
||||
typedef NTSTATUS (NTAPI *LdrLoadDll_func) (PWCHAR filePath, PULONG flags, PUNICODE_STRING moduleFileName, PHANDLE handle);
|
||||
static LdrLoadDll_func stub_LdrLoadDll;
|
||||
static WindowsDllInterceptor::FuncHookType<LdrLoadDll_func> stub_LdrLoadDll;
|
||||
|
||||
#ifdef _M_AMD64
|
||||
typedef decltype(RtlInstallFunctionTableCallback)* RtlInstallFunctionTableCallback_func;
|
||||
static RtlInstallFunctionTableCallback_func stub_RtlInstallFunctionTableCallback;
|
||||
static WindowsDllInterceptor::FuncHookType<RtlInstallFunctionTableCallback_func> stub_RtlInstallFunctionTableCallback;
|
||||
|
||||
extern uint8_t* sMsMpegJitCodeRegionStart;
|
||||
extern size_t sMsMpegJitCodeRegionSize;
|
||||
|
@ -662,7 +662,8 @@ DllBlocklist_Initialize(uint32_t aInitFlags)
|
|||
// We specifically use a detour, because there are cases where external
|
||||
// code also tries to hook LdrLoadDll, and doesn't know how to relocate our
|
||||
// nop space patches. (Bug 951827)
|
||||
bool ok = NtDllIntercept.AddDetour("LdrLoadDll", reinterpret_cast<intptr_t>(patched_LdrLoadDll), (void**) &stub_LdrLoadDll);
|
||||
bool ok = stub_LdrLoadDll.SetDetour(NtDllIntercept, "LdrLoadDll",
|
||||
&patched_LdrLoadDll);
|
||||
|
||||
if (!ok) {
|
||||
sBlocklistInitFailed = true;
|
||||
|
@ -683,18 +684,18 @@ DllBlocklist_Initialize(uint32_t aInitFlags)
|
|||
#ifdef _M_AMD64
|
||||
if (!IsWin8OrLater()) {
|
||||
// The crash that this hook works around is only seen on Win7.
|
||||
Kernel32Intercept.AddHook("RtlInstallFunctionTableCallback",
|
||||
reinterpret_cast<intptr_t>(patched_RtlInstallFunctionTableCallback),
|
||||
(void**)&stub_RtlInstallFunctionTableCallback);
|
||||
stub_RtlInstallFunctionTableCallback.Set(Kernel32Intercept,
|
||||
"RtlInstallFunctionTableCallback",
|
||||
&patched_RtlInstallFunctionTableCallback);
|
||||
}
|
||||
#endif
|
||||
|
||||
// Bug 1361410: WRusr.dll will overwrite our hook and cause a crash.
|
||||
// Workaround: If we detect WRusr.dll, don't hook.
|
||||
if (!GetModuleHandleW(L"WRusr.dll")) {
|
||||
if(!Kernel32Intercept.AddDetour("BaseThreadInitThunk",
|
||||
reinterpret_cast<intptr_t>(patched_BaseThreadInitThunk),
|
||||
(void**) &stub_BaseThreadInitThunk)) {
|
||||
if (!stub_BaseThreadInitThunk.SetDetour(Kernel32Intercept,
|
||||
"BaseThreadInitThunk",
|
||||
&patched_BaseThreadInitThunk)) {
|
||||
#ifdef DEBUG
|
||||
printf_stderr("BaseThreadInitThunk hook failed\n");
|
||||
#endif
|
||||
|
|
Загрузка…
Ссылка в новой задаче