Chromium Code Reviews| Index: chrome_elf/blacklist/blacklist.cc |
| diff --git a/chrome_elf/blacklist/blacklist.cc b/chrome_elf/blacklist/blacklist.cc |
| index a168c9a044c4ff0a5a54efa57eeeb6556ddcab3b..a2bfc2f6b953fcff5f750854f112996d7043cd49 100644 |
| --- a/chrome_elf/blacklist/blacklist.cc |
| +++ b/chrome_elf/blacklist/blacklist.cc |
| @@ -7,6 +7,8 @@ |
| #include <assert.h> |
| #include <string.h> |
| +#include <vector> |
| + |
| #include "base/basictypes.h" |
| #include "chrome_elf/blacklist/blacklist_interceptions.h" |
| #include "chrome_elf/chrome_elf_constants.h" |
| @@ -342,7 +344,61 @@ bool Initialize(bool force) { |
| RecordSuccessfulThunkSetup(&key); |
| + AddDllsFromRegistryToBlacklist(); |
| + |
| return NT_SUCCESS(ret) && page_executable; |
| } |
| +bool AddDllsFromRegistryToBlacklist() { |
| + HKEY key = NULL; |
| + LONG result = ::RegOpenKeyEx(HKEY_CURRENT_USER, |
| + kRegistryFinchListPath, |
| + 0, |
| + KEY_QUERY_VALUE | KEY_SET_VALUE, |
| + &key); |
| + |
| + if (result != ERROR_SUCCESS) |
| + return false; |
| + |
| + int num_dlls; |
|
robertshield
2014/05/30 21:07:08
= 0
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + int longest_name; |
|
robertshield
2014/05/30 21:07:08
= 0
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + ::RegQueryInfoKey(key, |
| + NULL, NULL, NULL, NULL, NULL, NULL, |
| + reinterpret_cast<DWORD*>(&num_dlls), |
| + reinterpret_cast<DWORD*>(&longest_name), |
| + NULL, NULL, NULL); |
| + |
| + // Collect dlls so that we can delete them after the enumeration. |
| + std::vector<wchar_t*> dll_names(num_dlls); |
|
robertshield
2014/05/30 21:07:08
using a std::vector<std::wstring> would save a bun
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + |
| + for (int i = 0; i < num_dlls; ++i) { |
| + DWORD name_len(longest_name + 1); |
|
robertshield
2014/05/30 21:07:08
prefer = syntax for POD types
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + DWORD value_len; |
|
robertshield
2014/05/30 21:07:08
= 0
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + wchar_t* name_buffer = new wchar_t[name_len]; |
|
robertshield
2014/05/30 21:07:08
it looks like name_buffer is leaked on every itera
krstnmnlsn
2014/06/02 14:00:37
In my defense, I don't actually think this was lea
robertshield
2014/06/03 03:03:00
Indeed, not leaking! Sorry for misreading :( still
|
| + result = ::RegEnumValue( |
| + key, i, name_buffer, &name_len, NULL, NULL, NULL, &value_len); |
| + name_len = name_len + 1; |
| + wchar_t* value_buffer = new wchar_t[value_len + 1]; |
| + result = ::RegEnumValue(key, i, name_buffer, &name_len, NULL, NULL, |
| + reinterpret_cast<BYTE*>(value_buffer), &value_len); |
| + value_buffer[value_len] = L'\0'; |
| + |
| + if (result == ERROR_SUCCESS) { |
| + AddDllToBlacklist(value_buffer); |
| + } |
| + |
| + dll_names[i] = name_buffer; |
|
robertshield
2014/05/30 21:07:08
use push_back() instead
krstnmnlsn
2014/06/02 14:00:37
Done.
|
| + |
| + delete[] value_buffer; |
| + } |
| + |
| + for (int i = 0; i < num_dlls; ++i) { |
| + ::RegDeleteValue(key, dll_names[i]); |
|
robertshield
2014/05/30 21:07:08
Why do we delete the values from the registry here
krstnmnlsn
2014/06/02 14:00:37
I thought that deleting values from the registry w
robertshield
2014/06/03 03:03:00
I actually meant, why do we delete them at all? Do
|
| + delete[] dll_names[i]; |
| + } |
| + |
| + ::RegCloseKey(key); |
| + return true; |
| +} |
| + |
| } // namespace blacklist |