Changeset 51999 in vbox for trunk/src/VBox/HostDrivers/Support/win/SUPHardenedVerifyProcess-win.cpp
- Timestamp:
- Jul 11, 2014 9:43:11 PM (10 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/HostDrivers/Support/win/SUPHardenedVerifyProcess-win.cpp
r51977 r51999 122 122 * The array is large enough to hold the executable, all allowed DLLs, and one 123 123 * more so we can get the image name of the first unwanted DLL. */ 124 SUPHNTVPIMAGE aImages[1+6+1]; 124 SUPHNTVPIMAGE aImages[1 + 6 + 1 125 #ifdef VBOX_PERMIT_VISUAL_STUDIO_PROFILING 126 + 16 127 #endif 128 ]; 125 129 /** Memory compare scratch buffer.*/ 126 130 uint8_t abMemory[_4K]; … … 150 154 "apphelp.dll", 151 155 "apisetschema.dll", 152 "sfc.dll" 156 "sfc.dll", 157 #ifdef VBOX_PERMIT_VISUAL_STUDIO_PROFILING 158 "psapi.dll", 159 "msvcrt.dll", 160 "advapi32.dll", 161 "sechost.dll", 162 "rpcrt4.dll", 163 "SamplingRuntime.dll", 164 #endif 153 165 }; 154 166 … … 817 829 pImage->fDll = true; 818 830 831 #ifndef VBOX_PERMIT_VISUAL_STUDIO_PROFILING 819 832 /* The directory name must match the one we've got for System32. */ 820 833 if ( cwcDirName * sizeof(WCHAR) != g_System32NtPath.UniStr.Length … … 825 838 "Expected %ls to be loaded from %ls.", 826 839 pImage->Name.UniStr.Buffer, g_System32NtPath.UniStr.Buffer); 827 840 #endif 828 841 break; 829 842 } … … 1038 1051 * Executable memory? 1039 1052 */ 1053 #ifndef VBOX_PERMIT_VISUAL_STUDIO_PROFILING 1040 1054 else if (MemInfo.Protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY)) 1041 1055 { … … 1050 1064 MemInfo.AllocationBase, 1051 1065 MemInfo.AllocationProtect); 1052 # ifdef IN_RING31066 # ifdef IN_RING3 1053 1067 /* Continue add more information about the problematic process. */ 1054 # else1068 # else 1055 1069 return pThis->rcResult; 1056 # endif1070 # endif 1057 1071 } 1072 #endif 1058 1073 1059 1074 /*
Note:
See TracChangeset
for help on using the changeset viewer.