зеркало из https://github.com/mozilla/gecko-dev.git
bd457a84a8
`patched_NtMapViewOfSection` uses the process default heap to copy a string. However, `patched_NtMapViewOfSection` can be invoked even before the process heap is initialized. One example we found is Windows Defender's EAF, with which "verifier.dll" is loaded before the process heap is initialized. This patch adds a check whether the heap is initialized or not in `patched_NtMapViewOfSection` and `NativeNtBlockSet::Add`. This also minimizes the usage of the heap, i.e. not copying a string when we block a dll. Differential Revision: https://phabricator.services.mozilla.com/D51028 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
DllBlocklist.cpp | ||
DllBlocklist.h | ||
Freestanding.h | ||
LoaderPrivateAPI.cpp | ||
LoaderPrivateAPI.h | ||
ModuleLoadFrame.cpp | ||
ModuleLoadFrame.h | ||
gen_ntdll_freestanding_lib.py | ||
moz.build | ||
ntdll_freestanding.def |