summaryrefslogtreecommitdiffstats
path: root/sandbox/src/target_interceptions.cc
diff options
context:
space:
mode:
authorcpu@google.com <cpu@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2008-09-18 01:45:09 +0000
committercpu@google.com <cpu@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2008-09-18 01:45:09 +0000
commit126720dd09a08ae7391568fe19f403a050be0627 (patch)
treebc4f78ded1e1582c291057302473308821288105 /sandbox/src/target_interceptions.cc
parente9e77e410bfb75a82ef7cdeb4027afea1c90daea (diff)
downloadchromium_src-126720dd09a08ae7391568fe19f403a050be0627.zip
chromium_src-126720dd09a08ae7391568fe19f403a050be0627.tar.gz
chromium_src-126720dd09a08ae7391568fe19f403a050be0627.tar.bz2
back out my sbox change
TBR=nsylvain Review URL: http://codereview.chromium.org/3132 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@2353 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/target_interceptions.cc')
-rw-r--r--sandbox/src/target_interceptions.cc26
1 files changed, 8 insertions, 18 deletions
diff --git a/sandbox/src/target_interceptions.cc b/sandbox/src/target_interceptions.cc
index 466c9ba..0bf9cd6 100644
--- a/sandbox/src/target_interceptions.cc
+++ b/sandbox/src/target_interceptions.cc
@@ -11,8 +11,6 @@
namespace sandbox {
-SANDBOX_INTERCEPT NtExports g_nt;
-
// Hooks NtMapViewOfSection to detect the load of DLLs. If hot patching is
// required for this dll, this functions patches it.
NTSTATUS WINAPI TargetNtMapViewOfSection(
@@ -43,26 +41,18 @@ NTSTATUS WINAPI TargetNtMapViewOfSection(
if (!IsValidImageSection(section, base, offset, view_size))
break;
- UINT image_flags;
- UNICODE_STRING* module_name =
- GetImageInfoFromModule(reinterpret_cast<HMODULE>(*base), &image_flags);
- UNICODE_STRING* file_name = GetBackingFilePath(*base);
+ UNICODE_STRING* module_name = GetImageNameFromModule(
+ reinterpret_cast<HMODULE>(*base));
- if ((!module_name) && (image_flags & MODULE_HAS_CODE)) {
- // If the module has no exports we retrieve the module name from the
- // full path of the mapped section.
- module_name = ExtractModuleName(file_name);
- }
+ if (!module_name)
+ break;
+
+ UNICODE_STRING* file_name = GetBackingFilePath(*base);
InterceptionAgent* agent = InterceptionAgent::GetInterceptionAgent();
- if (agent) {
- if (!agent->OnDllLoad(file_name, module_name, image_flags, *base)) {
- // Interception agent is demanding to un-map the module.
- g_nt.UnmapViewOfSection(process, *base);
- ret = STATUS_UNSUCCESSFUL;
- }
- }
+ if (agent)
+ agent->OnDllLoad(file_name, module_name, *base);
if (module_name)
operator delete(module_name, NT_ALLOC);