| Index: chrome/browser/chrome_content_browser_client.cc
|
| diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/chrome_content_browser_client.cc
|
| index 31c8f70af1f6a8d203d2ef405b1615fb23ff6ace..3d9c40c241fc019f6de2a251f6a983844f05504c 100644
|
| --- a/chrome/browser/chrome_content_browser_client.cc
|
| +++ b/chrome/browser/chrome_content_browser_client.cc
|
| @@ -178,7 +178,6 @@
|
| #include "base/win/windows_version.h"
|
| #include "chrome/browser/chrome_browser_main_win.h"
|
| #include "components/startup_metric_utils/common/pre_read_field_trial_utils_win.h"
|
| -#include "sandbox/win/src/sandbox_policy.h"
|
| #elif defined(OS_MACOSX)
|
| #include "chrome/browser/chrome_browser_main_mac.h"
|
| #elif defined(OS_CHROMEOS)
|
| @@ -2699,27 +2698,6 @@ base::string16 ChromeContentBrowserClient::GetAppContainerSidForSandboxType(
|
| return base::string16();
|
| }
|
|
|
| -bool ChromeContentBrowserClient::PreSpawnRenderer(
|
| - sandbox::TargetPolicy* policy) {
|
| - // This code is duplicated in nacl_exe_win_64.cc.
|
| - // Allow the server side of a pipe restricted to the "chrome.nacl."
|
| - // namespace so that it cannot impersonate other system or other chrome
|
| - // service pipes.
|
| - sandbox::ResultCode result = policy->AddRule(
|
| - sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
|
| - sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
|
| - L"\\\\.\\pipe\\chrome.nacl.*");
|
| - if (result != sandbox::SBOX_ALL_OK)
|
| - return false;
|
| -
|
| - // Renderers need to send named pipe handles and shared memory
|
| - // segment handles to NaCl loader processes.
|
| - result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_HANDLES,
|
| - sandbox::TargetPolicy::HANDLES_DUP_ANY,
|
| - L"File");
|
| - return result == sandbox::SBOX_ALL_OK;
|
| -}
|
| -
|
| bool ChromeContentBrowserClient::IsWin32kLockdownEnabledForMimeType(
|
| const std::string& mime_type) const {
|
| // First, check if any variation parameters have enabled or disabled this
|
|
|