| Index: chrome/browser/install_verification/win/imported_module_verification.cc
|
| diff --git a/chrome/browser/install_verification/win/imported_module_verification.cc b/chrome/browser/install_verification/win/imported_module_verification.cc
|
| index 86728652ddbe81b5541d33ef0a8aed6bb389c686..3d5abb68375e1751e65cd8dd2b4ced4107f9534c 100644
|
| --- a/chrome/browser/install_verification/win/imported_module_verification.cc
|
| +++ b/chrome/browser/install_verification/win/imported_module_verification.cc
|
| @@ -16,6 +16,7 @@
|
|
|
| namespace {
|
|
|
| +#if !defined(_WIN64)
|
| // We must make sure not to include modules here that are likely to get unloaded
|
| // because the scanning of the module is not done within a loader lock, so is
|
| // not resilient to changes made to the modules list.
|
| @@ -24,6 +25,7 @@ const wchar_t* const kModulesToScan[] = {
|
| L"kernel32.dll",
|
| L"user32.dll"
|
| };
|
| +#endif // !defined(_WIN64)
|
|
|
| bool AddressBeyondRange(const ModuleInfo& module, uintptr_t address) {
|
| return module.base_address + module.size < address;
|
|
|