Changeset 52656 in vbox
- Timestamp:
- Sep 9, 2014 2:06:16 PM (10 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/HostDrivers/Support/win/SUPR3HardenedMain-win.cpp
r52634 r52656 3191 3191 if (pvBase) 3192 3192 { 3193 /*SUP_DPRINTF(("supR3HardNtPuChUnmapDllFromChild: Calling NtUnmapViewOfSection on %p / %s\n", pvBase, pszShort));*/ 3193 3194 NTSTATUS rcNt = NtUnmapViewOfSection(pThis->hProcess, pvBase); 3194 3195 if (!NT_SUCCESS(!rcNt)) … … 3237 3238 { 3238 3239 SIZE_T cbView = 0; 3240 SUP_DPRINTF(("supR3HardNtPuChTriggerInitialImageEvents: mapping view of %s\n", pszShort)); /* For SEP. */ 3239 3241 rcNt = NtMapViewOfSection(hSection, pThis->hProcess, &pvRet, 0 /*ZeroBits*/, 0 /*CommitSize*/, 3240 3242 NULL /*pOffSect*/, &cbView, ViewShare, 0 /*AllocationType*/, PAGE_READWRITE); … … 3312 3314 * a 2nd time into the process before we actually start executing the thread 3313 3315 * and trigger the genuine image load events. 3314 */ 3316 * 3317 * Update: Turns out Symantec Endpoint Protection deadlocks when we map the 3318 * executable into the process like this. The system only works 3319 * halfways after that Powerbutton, impossible to shutdown without 3320 * using the power or reset button. The order of the two mappings 3321 * below doesn't matter. Haven't had time to look at stack yet. 3322 * Observed on W7/64, SEP v12.1.4112.4156. 3323 * 3324 */ 3325 #if 0 3315 3326 PVOID pvExe2 = supR3HardNtPuChMapDllIntoChild(pThis, &g_SupLibHardenedExeNtPath.UniStr, "executable[2nd]"); 3316 3327 #else 3328 PVOID pvExe2 = NULL; 3329 #endif 3317 3330 UNICODE_STRING NtName1 = RTNT_CONSTANT_UNISTR(L"\\SystemRoot\\System32\\ntdll.dll"); 3318 3331 PVOID pvNtDll2 = supR3HardNtPuChMapDllIntoChild(pThis, &NtName1, "ntdll.dll[2nd]");
Note:
See TracChangeset
for help on using the changeset viewer.