- Timestamp:
- Aug 10, 2019 2:50:30 AM (5 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/HostDrivers/Support/win/SUPR3HardenedMain-win.cpp
r80216 r80217 2976 2976 * This differs from the first function in that is no a system call and 2977 2977 * we're at the mercy of the handwritten assembly. 2978 * 2979 * Note! We depend on all waits up past the patching to be non-altertable, 2980 * otherwise an APC might slip by us. 2978 2981 */ 2979 2982 uint8_t * const pbKiUserApcDispatcher = (uint8_t *)(uintptr_t)pfnKiUserApcDispatcher; … … 5162 5165 /* 5163 5166 * Try shake anyone (e.g. easyhook) patching process creation code in 5164 * kernelbase, kernel32 or ntdll so they won't so easily cause the child 5167 * kernelbase, kernel32 or ntdll so they won't so easily cause the child 5165 5168 * to crash when we respawn and purify it. 5166 5169 */ 5167 SUP_DPRINTF(("supR3HardenedWinInit: doing limitedpurification...\n"));5170 SUP_DPRINTF(("supR3HardenedWinInit: Performing a limited self purification...\n")); 5168 5171 uint32_t cFixes = 0; 5169 5172 rc = supHardenedWinVerifyProcess(NtCurrentProcess(), NtCurrentThread(), SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED,
Note:
See TracChangeset
for help on using the changeset viewer.