| Index: sandbox/win/src/process_mitigations_win32k_policy.cc
|
| diff --git a/sandbox/win/src/process_mitigations_win32k_policy.cc b/sandbox/win/src/process_mitigations_win32k_policy.cc
|
| deleted file mode 100644
|
| index af18c5413c2815499f21e413403d6f9fd082daec..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/process_mitigations_win32k_policy.cc
|
| +++ /dev/null
|
| @@ -1,24 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/win/src/process_mitigations_win32k_policy.h"
|
| -
|
| -namespace sandbox {
|
| -
|
| -bool ProcessMitigationsWin32KLockdownPolicy::GenerateRules(
|
| - const wchar_t* name,
|
| - TargetPolicy::Semantics semantics,
|
| - LowLevelPolicy* policy) {
|
| - PolicyRule rule(FAKE_SUCCESS);
|
| - if (!policy->AddRule(IPC_GDI_GDIDLLINITIALIZE_TAG, &rule))
|
| - return false;
|
| - if (!policy->AddRule(IPC_GDI_GETSTOCKOBJECT_TAG, &rule))
|
| - return false;
|
| - if (!policy->AddRule(IPC_USER_REGISTERCLASSW_TAG, &rule))
|
| - return false;
|
| - return true;
|
| -}
|
| -
|
| -} // namespace sandbox
|
| -
|
|
|