2021-11-08 20:18:25 +01:00
|
|
|
diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc
|
2022-04-28 17:55:05 +02:00
|
|
|
index e4e7cfe65b87e..a669c90fd8937 100644
|
2021-11-08 20:18:25 +01:00
|
|
|
--- sandbox/policy/win/sandbox_win.cc
|
|
|
|
+++ sandbox/policy/win/sandbox_win.cc
|
2022-04-28 17:55:05 +02:00
|
|
|
@@ -1134,6 +1134,13 @@ ResultCode SandboxWin::StartSandboxedProcess(
|
2021-11-08 20:18:25 +01:00
|
|
|
const base::HandlesToInheritVector& handles_to_inherit,
|
|
|
|
SandboxDelegate* delegate,
|
|
|
|
base::Process* process) {
|
|
|
|
+ // Will be nullptr if SandboxInterfaceInfo was not initialized by the CEF
|
|
|
|
+ // client, meaning that the sandbox is implicitly disabled.
|
|
|
|
+ if (!g_broker_services) {
|
|
|
|
+ return LaunchWithoutSandbox(cmd_line, handles_to_inherit, delegate,
|
|
|
|
+ process);
|
|
|
|
+ }
|
|
|
|
+
|
2022-04-21 20:58:48 +02:00
|
|
|
auto policy = g_broker_services->CreatePolicy();
|
2021-11-08 20:18:25 +01:00
|
|
|
ResultCode result = GeneratePolicyForSandboxedProcess(
|
2022-04-21 20:58:48 +02:00
|
|
|
cmd_line, process_type, handles_to_inherit, delegate, policy.get());
|