diff --git a/toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp b/toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp index 5ac3af45593868be96fb9450b08c7eb41a64a1d5..a3c6e54da1598532effcf4e596b6bf86dd20181f 100644 --- a/toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp +++ b/toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp @@ -576,7 +576,7 @@ continue_loading: return ret; } -#if defined(NIGHTLY_BUILD) +#if defined(NIGHTLY_BUILD) || defined(BASE_BROWSER_VERSION) // Map of specific thread proc addresses we should block. In particular, // LoadLibrary* APIs which indicate DLL injection static void* gStartAddressesToBlock[4]; @@ -589,7 +589,7 @@ static bool ShouldBlockThread(void* aStartAddress) { return false; } -#if defined(NIGHTLY_BUILD) +#if defined(NIGHTLY_BUILD) || defined(BASE_BROWSER_VERSION) for (auto p : gStartAddressesToBlock) { if (p == aStartAddress) { return true; @@ -662,7 +662,7 @@ MFBT_API void DllBlocklist_Initialize(uint32_t aInitFlags) { } } -#if defined(NIGHTLY_BUILD) +#if defined(NIGHTLY_BUILD) || defined(BASE_BROWSER_VERSION) // Populate a list of thread start addresses to block. HMODULE hKernel = GetModuleHandleW(L"kernel32.dll"); if (hKernel) {