From 492451464ad24fda6a6689f9b41bc1010c554ff9 Mon Sep 17 00:00:00 2001 From: Marcus Meissner Date: Wed, 31 Dec 2003 00:12:31 +0000 Subject: [PATCH] Removed too strict header check to enable execution of handcoded PE exes. --- dlls/kernel/module.c | 6 ------ 1 file changed, 6 deletions(-) diff --git a/dlls/kernel/module.c b/dlls/kernel/module.c index 1baa08501db..be4af66bfce 100644 --- a/dlls/kernel/module.c +++ b/dlls/kernel/module.c @@ -192,12 +192,6 @@ enum binary_type MODULE_GetBinaryType( HANDLE hfile ) * This will tell us if there is more header information * to read or not. */ - /* But before we do we will make sure that header - * structure encompasses the "Offset to extended header" - * field. - */ - if (header.mz.e_lfanew < sizeof(IMAGE_DOS_HEADER)) - return BINARY_DOS; if (SetFilePointer( hfile, header.mz.e_lfanew, NULL, SEEK_SET ) == -1) return BINARY_DOS; if (!ReadFile( hfile, magic, sizeof(magic), &len, NULL ) || len != sizeof(magic))