| Index: chrome/browser/safe_browsing/incident_reporting/environment_data_collection_win.cc
|
| diff --git a/chrome/browser/safe_browsing/incident_reporting/environment_data_collection_win.cc b/chrome/browser/safe_browsing/incident_reporting/environment_data_collection_win.cc
|
| index 829fd6d07cc321542cb0c8949703dd0cd8f21ca5..c97c8e141124f20acf5f58748b30007b16b68e48 100644
|
| --- a/chrome/browser/safe_browsing/incident_reporting/environment_data_collection_win.cc
|
| +++ b/chrome/browser/safe_browsing/incident_reporting/environment_data_collection_win.cc
|
| @@ -25,7 +25,6 @@
|
| #include "chrome/browser/safe_browsing/path_sanitizer.h"
|
| #include "chrome/common/safe_browsing/binary_feature_extractor.h"
|
| #include "chrome/common/safe_browsing/csd.pb.h"
|
| -#include "chrome_elf/chrome_elf_constants.h"
|
| #include "components/variations/variations_associated_data.h"
|
|
|
| namespace safe_browsing {
|
| @@ -37,7 +36,6 @@ const REGSAM kKeyReadNoNotify = (KEY_READ) & ~(KEY_NOTIFY);
|
| // The modules on which we will run VerifyModule.
|
| const wchar_t* const kModulesToVerify[] = {
|
| L"chrome.dll",
|
| - L"chrome_elf.dll",
|
| L"ntdll.dll",
|
| };
|
|
|
| @@ -235,14 +233,7 @@ void RecordLspFeature(ClientIncidentReport_EnvironmentData_Process* process) {
|
|
|
| void CollectDllBlacklistData(
|
| ClientIncidentReport_EnvironmentData_Process* process) {
|
| - PathSanitizer path_sanitizer;
|
| - base::win::RegistryValueIterator iter(HKEY_CURRENT_USER,
|
| - blacklist::kRegistryFinchListPath);
|
| - for (; iter.Valid(); ++iter) {
|
| - base::FilePath dll_name(iter.Value());
|
| - path_sanitizer.StripHomeDirectory(&dll_name);
|
| - process->add_blacklisted_dll(dll_name.AsUTF8Unsafe());
|
| - }
|
| + // TODO(implement this).
|
| }
|
|
|
| void CollectModuleVerificationData(
|
|
|