Index: content/browser/utility_process_host_impl.cc |
diff --git a/content/browser/utility_process_host_impl.cc b/content/browser/utility_process_host_impl.cc |
index 7e7f3aa04c8e746ad5796a9dbf362bc0086681db..ae5efd2eff8914712c150e09bf73e880b14955de 100644 |
--- a/content/browser/utility_process_host_impl.cc |
+++ b/content/browser/utility_process_host_impl.cc |
@@ -41,11 +41,6 @@ |
#include "content/public/browser/zygote_handle_linux.h" |
#endif // defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_MACOSX) |
-#if defined(OS_WIN) |
-#include "sandbox/win/src/sandbox_policy.h" |
-#include "sandbox/win/src/sandbox_types.h" |
-#endif |
- |
namespace content { |
#if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_MACOSX) |
@@ -81,21 +76,7 @@ class UtilitySandboxedProcessLauncherDelegate |
bool ShouldLaunchElevated() override { return launch_elevated_; } |
bool PreSpawnTarget(sandbox::TargetPolicy* policy) override { |
- if (exposed_dir_.empty()) |
- return true; |
- |
- sandbox::ResultCode result; |
- result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, |
- sandbox::TargetPolicy::FILES_ALLOW_ANY, |
- exposed_dir_.value().c_str()); |
- if (result != sandbox::SBOX_ALL_OK) |
- return false; |
- |
- base::FilePath exposed_files = exposed_dir_.AppendASCII("*"); |
- result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, |
- sandbox::TargetPolicy::FILES_ALLOW_ANY, |
- exposed_files.value().c_str()); |
- return result == sandbox::SBOX_ALL_OK; |
+ return true; |
} |
#elif defined(OS_POSIX) |