Index: chrome_elf/chrome_elf_main.cc |
diff --git a/chrome_elf/chrome_elf_main.cc b/chrome_elf/chrome_elf_main.cc |
index a0bf20a3e53f494ce8f15b2dbcd2bc6fbefc2521..181f2ec8f23ff24cb5f90b347f6f1b9f2c9840e8 100644 |
--- a/chrome_elf/chrome_elf_main.cc |
+++ b/chrome_elf/chrome_elf_main.cc |
@@ -10,6 +10,7 @@ |
#include "chrome/install_static/install_details.h" |
#include "chrome/install_static/install_util.h" |
#include "chrome/install_static/product_install_details.h" |
+#include "chrome/install_static/user_data_dir.h" |
#include "chrome_elf/blacklist/blacklist.h" |
#include "chrome_elf/crash/crash_helper.h" |
@@ -28,6 +29,21 @@ void SignalChromeElf() { |
blacklist::ResetBeacon(); |
} |
+extern "C" void GetUserDataDirectoryThunk(wchar_t* user_data_dir, |
+ size_t user_data_dir_length, |
+ wchar_t* invalid_user_data_dir, |
+ size_t invalid_user_data_dir_length) { |
+ std::wstring user_data_dir_str, invalid_user_data_dir_str; |
+ bool ret = install_static::GetUserDataDirectory(&user_data_dir_str, |
+ &invalid_user_data_dir_str); |
+ assert(ret); |
+ install_static::IgnoreUnused(ret); |
+ wcsncpy_s(user_data_dir, user_data_dir_length, user_data_dir_str.c_str(), |
+ _TRUNCATE); |
+ wcsncpy_s(invalid_user_data_dir, invalid_user_data_dir_length, |
+ invalid_user_data_dir_str.c_str(), _TRUNCATE); |
+} |
+ |
// Returns the payload for the ELF's InstallDetails instance. For use by |
// install_static::InstallDetails::InitializeFromPrimaryModule. |
extern "C" const install_static::InstallDetails::Payload* |
@@ -39,11 +55,11 @@ BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { |
if (reason == DLL_PROCESS_ATTACH) { |
install_static::InitializeProductDetailsForPrimaryModule(); |
-// CRT on initialization installs an exception filter which calls |
-// TerminateProcess. We need to hook CRT's attempt to set an exception. |
-// NOTE: Do not hook if ASan is present, or ASan will fail to install |
-// its own unhandled exception filter. |
#if !defined(ADDRESS_SANITIZER) |
+ // CRT on initialization installs an exception filter which calls |
+ // TerminateProcess. We need to hook CRT's attempt to set an exception. |
+ // NOTE: Do not hook if ASan is present, or ASan will fail to install |
+ // its own unhandled exception filter. |
elf_crash::DisableSetUnhandledExceptionFilter(); |
#endif // !defined (ADDRESS_SANITIZER) |