Index: chrome/browser/utility_process_host.cc |
diff --git a/chrome/browser/utility_process_host.cc b/chrome/browser/utility_process_host.cc |
index 324a7f553ac290945a6c9c0144c479ee8c87da1f..be5397e667f7b9b7ffbd385f26af2b53f89130d0 100644 |
--- a/chrome/browser/utility_process_host.cc |
+++ b/chrome/browser/utility_process_host.cc |
@@ -26,32 +26,9 @@ UtilityProcessHost::~UtilityProcessHost() { |
} |
bool UtilityProcessHost::StartExtensionUnpacker(const FilePath& extension) { |
- FilePath initial_path = extension.DirName(); |
- FilePath real_path; |
- |
- // The utility process will have access to the directory passed to |
- // StartProcess(). That directory should not be a symlink or NTFS |
- // junctions, because when the path is used, following the link will |
- // cause file system access outside the sandbox path. |
- |
-#if defined(OS_POSIX) |
- // Resolve symlinks to get a symlink free path. |
- if (!file_util::RealPath(initial_path, &real_path)) { |
- real_path = initial_path; |
- } |
-#else |
- // TODO(skerner): For windows, we need to expand NTFS junctions. |
- // http://crbug.com/13044 |
- real_path = initial_path; |
-#endif |
- |
- // TODO(skerner): Remove this logging once we understand crbug.com/35198 |
- LOG(INFO) << "initial_path: " << initial_path.value(); |
- LOG(INFO) << "real_path: " << real_path.value(); |
- |
// Grant the subprocess access to the entire subdir the extension file is |
// in, so that it can unpack to that dir. |
- if (!StartProcess(real_path)) |
+ if (!StartProcess(extension.DirName())) |
return false; |
Send(new UtilityMsg_UnpackExtension(extension)); |