зеркало из https://github.com/mozilla/gecko-dev.git
eb086eb295
When `WindowsDllInterceptor` detours a function in a remote process, it calculates a target address via `GetProcAddress` in the caller's process first, and detours that address in the target process. If the caller's export table was modified, the target address might be invalid in the target process. With this patch, `WindowsDllInterceptor` uses the target process's export table to calculate a target function address. Differential Revision: https://phabricator.services.mozilla.com/D58305 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
decimal | ||
interceptor | ||
AutoProfilerLabel.cpp | ||
AutoProfilerLabel.h | ||
ConditionVariable_posix.cpp | ||
ConditionVariable_windows.cpp | ||
Debug.h | ||
DynamicallyLinkedFunctionPtr.h | ||
ImportDir.h | ||
MutexPlatformData_posix.h | ||
MutexPlatformData_windows.h | ||
Mutex_posix.cpp | ||
Mutex_windows.cpp | ||
NativeNt.h | ||
PlatformConditionVariable.h | ||
PlatformMutex.h | ||
Printf.cpp | ||
Printf.h | ||
StackWalk.cpp | ||
StackWalk.h | ||
StackWalk_windows.h | ||
TimeStamp.cpp | ||
TimeStamp.h | ||
TimeStamp_darwin.cpp | ||
TimeStamp_posix.cpp | ||
TimeStamp_windows.cpp | ||
TimeStamp_windows.h | ||
WinUtils.h | ||
WindowsMapRemoteView.cpp | ||
WindowsMapRemoteView.h | ||
WindowsProcessMitigations.cpp | ||
WindowsProcessMitigations.h | ||
WindowsUnicode.cpp | ||
WindowsUnicode.h | ||
moz.build | ||
nsWindowsDllInterceptor.h |