Index: content/common/sandbox_policy.cc |
=================================================================== |
--- content/common/sandbox_policy.cc (revision 188116) |
+++ content/common/sandbox_policy.cc (working copy) |
@@ -323,14 +323,6 @@ |
L"\\??\\pipe\\chrome.*"); |
if (result != sandbox::SBOX_ALL_OK) |
return false; |
- // Allow the server side of a pipe restricted to the "chrome.nacl." |
- // namespace so that it cannot impersonate other system or other chrome |
- // service pipes. |
- result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, |
- sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY, |
- L"\\\\.\\pipe\\chrome.nacl.*"); |
- if (result != sandbox::SBOX_ALL_OK) |
- return false; |
// Allow the server side of sync sockets, which are pipes that have |
// the "chrome.sync" namespace and a randomly generated suffix. |
result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_NAMED_PIPES, |
@@ -820,6 +812,10 @@ |
return 0; |
} |
+#if !defined(NACL_WIN64) |
+ GetContentClient()->AddPolicy(cmd_line, policy); |
cpu_(ooo_6.6-7.5)
2013/03/15 17:58:53
how about not having this #if here and have it in
jam
2013/03/15 18:06:33
the problem was that the nacl win64 binary doesn't
|
+#endif |
+ |
if (browser_command_line.HasSwitch(switches::kEnableLogging)) { |
// If stdout/stderr point to a Windows console, these calls will |
// have no effect. |