diff options
author | Mike McLaughlin <mikem@microsoft.com> | 2018-01-19 11:12:02 -0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-01-19 11:12:02 -0800 |
commit | 37358edeb2bd2f2cd4e4ee0ebd7ecc021f1aee27 (patch) | |
tree | c4960b09adfa7c6a72f6da5b425604e2e1bc954b /src/ToolBox | |
parent | f1c732878777092468ef8da8cd61aa8ec0922948 (diff) | |
download | coreclr-37358edeb2bd2f2cd4e4ee0ebd7ecc021f1aee27.tar.gz coreclr-37358edeb2bd2f2cd4e4ee0ebd7ecc021f1aee27.tar.bz2 coreclr-37358edeb2bd2f2cd4e4ee0ebd7ecc021f1aee27.zip |
Revert "Change just-in-time debugging registry keys. (#15722)" (#15921)
This reverts commit 8b2cac974db3edde38e1a555455f53592d03b68e.
Diffstat (limited to 'src/ToolBox')
-rw-r--r-- | src/ToolBox/superpmi/superpmi/jitdebugger.cpp | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/ToolBox/superpmi/superpmi/jitdebugger.cpp b/src/ToolBox/superpmi/superpmi/jitdebugger.cpp index 13e7db5a60..80038647af 100644 --- a/src/ToolBox/superpmi/superpmi/jitdebugger.cpp +++ b/src/ToolBox/superpmi/superpmi/jitdebugger.cpp @@ -193,7 +193,7 @@ BOOL IsCurrentModuleFileNameInAutoExclusionList() { HKEY hKeyHolder; - // Look for "HKLM\\SOFTWARE\\Microsoft\\.NETCore\\JITDebugging\\AutoExclusionList" + // Look for "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug\\AutoExclusionList" DWORD ret = WszRegOpenKeyEx(HKEY_LOCAL_MACHINE, kUnmanagedDebuggerAutoExclusionListKey, 0, KEY_READ, &hKeyHolder); if (ret != ERROR_SUCCESS) @@ -277,15 +277,15 @@ HRESULT GetDebuggerSettingInfoWorker(__out_ecount_part_opt(*pcchDebuggerString, HKEY hKey; - // Look for "HKLM\\SOFTWARE\\Microsoft\\.NETCore\\JITDebugging" + // Look for "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug" DWORD ret = WszRegOpenKeyEx(HKEY_LOCAL_MACHINE, kUnmanagedDebuggerKey, 0, KEY_READ, &hKey); if (ret != ERROR_SUCCESS) - { // Wow, there's not even an JITDebugging hive, so no native debugger, no auto. + { // Wow, there's not even an AeDebug hive, so no native debugger, no auto. return S_OK; } - // Look in JITDebugging key for "Debugger"; get the size of any value stored there. + // Look in AeDebug key for "Debugger"; get the size of any value stored there. DWORD valueType, valueSize; ret = RegQueryValueExW(hKey, kUnmanagedDebuggerValue, 0, &valueType, 0, &valueSize); @@ -337,7 +337,7 @@ HRESULT GetDebuggerSettingInfoWorker(__out_ecount_part_opt(*pcchDebuggerString, } else { - // Look in JITDebugging key for "Auto"; get the size of any value stored there. + // Look in AeDebug key for "Auto"; get the size of any value stored there. ret = RegQueryValueExW(hKey, kUnmanagedDebuggerAutoValue, 0, &valueType, 0, &valueSize); if ((ret == ERROR_SUCCESS) && (valueType == REG_SZ) && (valueSize / sizeof(WCHAR) < MAX_PATH)) { |