| Index: chrome/browser/win/chrome_elf_init.cc
|
| diff --git a/chrome/browser/win/chrome_elf_init.cc b/chrome/browser/win/chrome_elf_init.cc
|
| index d954dbe45454e49c1eb427ed904e44cb31a0cbb9..5c091296c46aa393c7ca68a47c3c5139a3b0b775 100644
|
| --- a/chrome/browser/win/chrome_elf_init.cc
|
| +++ b/chrome/browser/win/chrome_elf_init.cc
|
| @@ -18,7 +18,6 @@
|
| #include "chrome_elf/dll_hash/dll_hash.h"
|
| #include "components/variations/variations_associated_data.h"
|
| #include "content/public/browser/browser_thread.h"
|
| -#include "content/public/common/content_features.h"
|
|
|
| const char kBrowserBlacklistTrialName[] = "BrowserBlacklist";
|
| const char kBrowserBlacklistTrialDisabledGroupName[] = "NoBlacklist";
|
| @@ -110,22 +109,6 @@
|
| FROM_HERE,
|
| base::Bind(&ReportSuccessfulBlocks),
|
| base::TimeDelta::FromSeconds(kBlacklistReportingDelaySec));
|
| -
|
| - // Make sure the early finch emergency "off switch" for
|
| - // sandbox::MITIGATION_EXTENSION_POINT_DISABLE is set properly in reg.
|
| - // Note: the very existence of this key signals elf to not enable
|
| - // this mitigation on browser next start.
|
| - base::win::RegKey finch_security_registry_key(
|
| - HKEY_CURRENT_USER, elf_sec::kRegSecurityFinchPath, KEY_READ);
|
| -
|
| - if (base::FeatureList::IsEnabled(features::kWinSboxDisableExtensionPoints)) {
|
| - if (finch_security_registry_key.Valid())
|
| - finch_security_registry_key.DeleteKey(L"");
|
| - } else {
|
| - if (!finch_security_registry_key.Valid())
|
| - finch_security_registry_key.Create(
|
| - HKEY_CURRENT_USER, elf_sec::kRegSecurityFinchPath, KEY_WRITE);
|
| - }
|
| }
|
|
|
| void BrowserBlacklistBeaconSetup() {
|
|
|