Chromium Code Reviews| Index: chrome_elf/chrome_elf_main.cc |
| diff --git a/chrome_elf/chrome_elf_main.cc b/chrome_elf/chrome_elf_main.cc |
| index a0bf20a3e53f494ce8f15b2dbcd2bc6fbefc2521..fdbeb0b75ba61f7676ec351f889944e2bc246c77 100644 |
| --- a/chrome_elf/chrome_elf_main.cc |
| +++ b/chrome_elf/chrome_elf_main.cc |
| @@ -10,6 +10,7 @@ |
| #include "chrome/install_static/install_details.h" |
| #include "chrome/install_static/install_util.h" |
| #include "chrome/install_static/product_install_details.h" |
| +#include "chrome/install_static/user_data_dir.h" |
| #include "chrome_elf/blacklist/blacklist.h" |
| #include "chrome_elf/crash/crash_helper.h" |
| @@ -28,6 +29,19 @@ void SignalChromeElf() { |
| blacklist::ResetBeacon(); |
| } |
| +extern "C" void GetUserDataDirectoryThunk(wchar_t* user_data_dir, |
| + size_t user_data_dir_length, |
| + wchar_t* invalid_user_data_dir, |
| + size_t invalid_user_data_dir_length) { |
| + std::wstring user_data_dir_str, invalid_user_data_dir_str; |
| + bool ret = install_static::GetUserDataDirectory(&user_data_dir_str, |
| + &invalid_user_data_dir_str); |
| + assert(ret); |
| + wcscpy_s(user_data_dir, user_data_dir_length, user_data_dir_str.c_str()); |
|
grt (UTC plus 2)
2016/11/23 09:47:37
looks like this is counting on the crt's parameter
scottmg
2016/11/23 17:59:03
I think process_startup_helper.cc is fine (other t
|
| + wcscpy_s(invalid_user_data_dir, invalid_user_data_dir_length, |
| + invalid_user_data_dir_str.c_str()); |
| +} |
| + |
| // Returns the payload for the ELF's InstallDetails instance. For use by |
| // install_static::InstallDetails::InitializeFromPrimaryModule. |
| extern "C" const install_static::InstallDetails::Payload* |
| @@ -39,11 +53,11 @@ BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { |
| if (reason == DLL_PROCESS_ATTACH) { |
| install_static::InitializeProductDetailsForPrimaryModule(); |
| -// CRT on initialization installs an exception filter which calls |
| -// TerminateProcess. We need to hook CRT's attempt to set an exception. |
| -// NOTE: Do not hook if ASan is present, or ASan will fail to install |
| -// its own unhandled exception filter. |
| #if !defined(ADDRESS_SANITIZER) |
| + // CRT on initialization installs an exception filter which calls |
| + // TerminateProcess. We need to hook CRT's attempt to set an exception. |
| + // NOTE: Do not hook if ASan is present, or ASan will fail to install |
| + // its own unhandled exception filter. |
| elf_crash::DisableSetUnhandledExceptionFilter(); |
| #endif // !defined (ADDRESS_SANITIZER) |