Index: chrome/browser/install_verification/win/imported_module_verification.cc |
diff --git a/chrome/browser/install_verification/win/imported_module_verification.cc b/chrome/browser/install_verification/win/imported_module_verification.cc |
index 86728652ddbe81b5541d33ef0a8aed6bb389c686..3d5abb68375e1751e65cd8dd2b4ced4107f9534c 100644 |
--- a/chrome/browser/install_verification/win/imported_module_verification.cc |
+++ b/chrome/browser/install_verification/win/imported_module_verification.cc |
@@ -16,6 +16,7 @@ |
namespace { |
+#if !defined(_WIN64) |
// We must make sure not to include modules here that are likely to get unloaded |
// because the scanning of the module is not done within a loader lock, so is |
// not resilient to changes made to the modules list. |
@@ -24,6 +25,7 @@ const wchar_t* const kModulesToScan[] = { |
L"kernel32.dll", |
L"user32.dll" |
}; |
+#endif // !defined(_WIN64) |
bool AddressBeyondRange(const ModuleInfo& module, uintptr_t address) { |
return module.base_address + module.size < address; |