| Index: sandbox/win/src/target_process.cc
|
| ===================================================================
|
| --- sandbox/win/src/target_process.cc (revision 156579)
|
| +++ sandbox/win/src/target_process.cc (working copy)
|
| @@ -35,29 +35,8 @@
|
| }
|
| }
|
|
|
| -// Reserve a random range at the bottom of the address space in the target
|
| -// process to prevent predictable alocations at low addresses.
|
| -void PoisonLowerAddressRange(HANDLE process) {
|
| - unsigned int limit;
|
| - rand_s(&limit);
|
| - char* ptr = 0;
|
| - const size_t kMask64k = 0xFFFF;
|
| - // Random range (512k-16.5mb) in 64k steps.
|
| - const char* end = ptr + ((((limit % 16384) + 512) * 1024) & ~kMask64k);
|
| - while (ptr < end) {
|
| - MEMORY_BASIC_INFORMATION memory_info;
|
| - if (!::VirtualQueryEx(process, ptr, &memory_info, sizeof(memory_info)))
|
| - break;
|
| - size_t size = std::min((memory_info.RegionSize + kMask64k) & ~kMask64k,
|
| - static_cast<SIZE_T>(end - ptr));
|
| - if (ptr && memory_info.State == MEM_FREE)
|
| - ::VirtualAllocEx(process, ptr, size, MEM_RESERVE, PAGE_NOACCESS);
|
| - ptr += size;
|
| - }
|
| }
|
|
|
| -}
|
| -
|
| namespace sandbox {
|
|
|
| SANDBOX_INTERCEPT HANDLE g_shared_section;
|
| @@ -168,8 +147,6 @@
|
| }
|
| lockdown_token_.Close();
|
|
|
| - PoisonLowerAddressRange(process_info.process_handle());
|
| -
|
| DWORD win_result = ERROR_SUCCESS;
|
|
|
| // Assign the suspended target to the windows job object.
|
|
|