| Index: chrome/browser/utility_process_host.cc
|
| diff --git a/chrome/browser/utility_process_host.cc b/chrome/browser/utility_process_host.cc
|
| index 324a7f553ac290945a6c9c0144c479ee8c87da1f..be5397e667f7b9b7ffbd385f26af2b53f89130d0 100644
|
| --- a/chrome/browser/utility_process_host.cc
|
| +++ b/chrome/browser/utility_process_host.cc
|
| @@ -26,32 +26,9 @@ UtilityProcessHost::~UtilityProcessHost() {
|
| }
|
|
|
| bool UtilityProcessHost::StartExtensionUnpacker(const FilePath& extension) {
|
| - FilePath initial_path = extension.DirName();
|
| - FilePath real_path;
|
| -
|
| - // The utility process will have access to the directory passed to
|
| - // StartProcess(). That directory should not be a symlink or NTFS
|
| - // junctions, because when the path is used, following the link will
|
| - // cause file system access outside the sandbox path.
|
| -
|
| -#if defined(OS_POSIX)
|
| - // Resolve symlinks to get a symlink free path.
|
| - if (!file_util::RealPath(initial_path, &real_path)) {
|
| - real_path = initial_path;
|
| - }
|
| -#else
|
| - // TODO(skerner): For windows, we need to expand NTFS junctions.
|
| - // http://crbug.com/13044
|
| - real_path = initial_path;
|
| -#endif
|
| -
|
| - // TODO(skerner): Remove this logging once we understand crbug.com/35198
|
| - LOG(INFO) << "initial_path: " << initial_path.value();
|
| - LOG(INFO) << "real_path: " << real_path.value();
|
| -
|
| // Grant the subprocess access to the entire subdir the extension file is
|
| // in, so that it can unpack to that dir.
|
| - if (!StartProcess(real_path))
|
| + if (!StartProcess(extension.DirName()))
|
| return false;
|
|
|
| Send(new UtilityMsg_UnpackExtension(extension));
|
|
|