| Index: chrome/browser/sandbox_policy.cc
|
| ===================================================================
|
| --- chrome/browser/sandbox_policy.cc (revision 27325)
|
| +++ chrome/browser/sandbox_policy.cc (working copy)
|
| @@ -359,8 +359,6 @@
|
| type = ChildProcessInfo::PLUGIN_PROCESS;
|
| } else if (type_str == switches::kWorkerProcess) {
|
| type = ChildProcessInfo::WORKER_PROCESS;
|
| - } else if (type_str == switches::kNaClProcess) {
|
| - type = ChildProcessInfo::NACL_PROCESS;
|
| } else if (type_str == switches::kUtilityProcess) {
|
| type = ChildProcessInfo::UTILITY_PROCESS;
|
| } else {
|
| @@ -373,10 +371,8 @@
|
| (type != ChildProcessInfo::PLUGIN_PROCESS ||
|
| browser_command_line.HasSwitch(switches::kSafePlugins));
|
| #if !defined (GOOGLE_CHROME_BUILD)
|
| - if (browser_command_line.HasSwitch(switches::kInProcessPlugins) ||
|
| - browser_command_line.HasSwitch(switches::kInternalNaCl)) {
|
| + if (browser_command_line.HasSwitch(switches::kInProcessPlugins)) {
|
| // In process plugins won't work if the sandbox is enabled.
|
| - // The internal NaCl plugin doesn't work in the sandbox for now.
|
| in_sandbox = false;
|
| }
|
| #endif
|
| @@ -398,8 +394,6 @@
|
| sandbox::TargetPolicy* policy = broker_service->CreatePolicy();
|
|
|
| bool on_sandbox_desktop = false;
|
| - // TODO(gregoryd): try locked-down policy for sel_ldr after we fix IMC.
|
| - // TODO(gregoryd): do we need a new desktop for sel_ldr?
|
| if (type == ChildProcessInfo::PLUGIN_PROCESS) {
|
| if (!AddPolicyForPlugin(cmd_line, policy))
|
| return 0;
|
|
|