Changeset 52703 in vbox for trunk/src/VBox/HostDrivers/Support/win
- Timestamp:
- Sep 11, 2014 2:29:32 PM (10 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/HostDrivers/Support/win/SUPR3HardenedMain-win.cpp
r52679 r52703 3318 3318 * and trigger the genuine image load events. 3319 3319 * 3320 * Update: Turns out Symantec Endpoint Protection deadlocks when we map the 3321 * executable into the process like this. The system only works 3322 * halfways after that Powerbutton, impossible to shutdown without 3323 * using the power or reset button. The order of the two mappings 3324 * below doesn't matter. Haven't had time to look at stack yet. 3325 * Observed on W7/64, SEP v12.1.4112.4156. 3320 * Update #1 (after 4.3.15 build 7): 3321 * Turns out Symantec Endpoint Protection deadlocks when we map the 3322 * executable into the process like this. The system only works 3323 * halfways after that Powerbutton, impossible to shutdown without 3324 * using the power or reset button. The order of the two mappings 3325 * below doesn't matter. Haven't had time to look at stack yet. 3326 * Observed on W7/64, SEP v12.1.4112.4156. 3326 3327 * 3328 * Update #2 (after 4.3.16): 3329 * Some avast! users complain about a deadlock mapping ntdll.dll 3330 * as well. Unfortunately not reproducible, so there may possibly be 3331 * some other cause. Sad as it's really a serious bug in whichever 3332 * software it is that is causing it, and we'd like to report it to 3333 * the responsible party. 3327 3334 */ 3328 3335 #if 0 … … 3331 3338 PVOID pvExe2 = NULL; 3332 3339 #endif 3340 #if 0 3333 3341 UNICODE_STRING NtName1 = RTNT_CONSTANT_UNISTR(L"\\SystemRoot\\System32\\ntdll.dll"); 3334 3342 PVOID pvNtDll2 = supR3HardNtPuChMapDllIntoChild(pThis, &NtName1, "ntdll.dll[2nd]"); 3343 #else 3344 PVOID pvNtDll2 = NULL; 3345 #endif 3335 3346 3336 3347 /*
Note:
See TracChangeset
for help on using the changeset viewer.