| Index: content/common/sandbox_win.cc
|
| diff --git a/content/common/sandbox_win.cc b/content/common/sandbox_win.cc
|
| index 0c8bf9323a5560e4caf10c7616f7d752f39b550d..2cd1e9c32ca8233f51efe021dc44fe59d5124a0f 100644
|
| --- a/content/common/sandbox_win.cc
|
| +++ b/content/common/sandbox_win.cc
|
| @@ -708,8 +708,7 @@
|
| return sandbox::SBOX_ALL_OK;
|
| }
|
|
|
| - scoped_refptr<sandbox::TargetPolicy> policy =
|
| - g_broker_services->CreatePolicy();
|
| + sandbox::TargetPolicy* policy = g_broker_services->CreatePolicy();
|
|
|
| // Add any handles to be inherited to the policy.
|
| for (HANDLE handle : handles_to_inherit)
|
| @@ -738,7 +737,7 @@
|
| #if !defined(NACL_WIN64)
|
| if (type_str == switches::kRendererProcess &&
|
| IsWin32kRendererLockdownEnabled()) {
|
| - result = AddWin32kLockdownPolicy(policy.get(), false);
|
| + result = AddWin32kLockdownPolicy(policy, false);
|
| if (result != sandbox::SBOX_ALL_OK)
|
| return result;
|
| }
|
| @@ -752,12 +751,12 @@
|
| if (result != sandbox::SBOX_ALL_OK)
|
| return result;
|
|
|
| - result = SetJobLevel(*cmd_line, sandbox::JOB_LOCKDOWN, 0, policy.get());
|
| + result = SetJobLevel(*cmd_line, sandbox::JOB_LOCKDOWN, 0, policy);
|
| if (result != sandbox::SBOX_ALL_OK)
|
| return result;
|
|
|
| if (!delegate->DisableDefaultPolicy()) {
|
| - result = AddPolicyForSandboxedProcess(policy.get());
|
| + result = AddPolicyForSandboxedProcess(policy);
|
| if (result != sandbox::SBOX_ALL_OK)
|
| return result;
|
| }
|
| @@ -766,7 +765,7 @@
|
| if (type_str == switches::kRendererProcess ||
|
| type_str == switches::kPpapiPluginProcess) {
|
| AddDirectory(base::DIR_WINDOWS_FONTS, NULL, true,
|
| - sandbox::TargetPolicy::FILES_ALLOW_READONLY, policy.get());
|
| + sandbox::TargetPolicy::FILES_ALLOW_READONLY, policy);
|
| }
|
| #endif
|
|
|
| @@ -777,7 +776,7 @@
|
| cmd_line->AppendSwitchASCII("ignored", " --type=renderer ");
|
| }
|
|
|
| - result = AddGenericPolicy(policy.get());
|
| + result = AddGenericPolicy(policy);
|
|
|
| if (result != sandbox::SBOX_ALL_OK) {
|
| NOTREACHED();
|
| @@ -802,7 +801,7 @@
|
| policy->SetStdoutHandle(GetStdHandle(STD_OUTPUT_HANDLE));
|
| policy->SetStderrHandle(GetStdHandle(STD_ERROR_HANDLE));
|
|
|
| - if (!delegate->PreSpawnTarget(policy.get()))
|
| + if (!delegate->PreSpawnTarget(policy))
|
| return sandbox::SBOX_ERROR_DELEGATE_PRE_SPAWN;
|
|
|
| TRACE_EVENT_BEGIN0("startup", "StartProcessWithAccess::LAUNCHPROCESS");
|
|
|