2021-11-08 14:18:25 -05:00
|
|
|
diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc
|
2024-11-14 17:07:03 -05:00
|
|
|
index 5f5857379ad34..1de09e19a2350 100644
|
2021-11-08 14:18:25 -05:00
|
|
|
--- sandbox/policy/win/sandbox_win.cc
|
|
|
|
+++ sandbox/policy/win/sandbox_win.cc
|
2024-10-24 11:05:31 -04:00
|
|
|
@@ -963,6 +963,17 @@ ResultCode SandboxWin::StartSandboxedProcess(
|
2021-11-08 14:18:25 -05:00
|
|
|
const base::HandlesToInheritVector& handles_to_inherit,
|
|
|
|
SandboxDelegate* delegate,
|
2024-10-24 11:05:31 -04:00
|
|
|
StartSandboxedProcessCallback result_callback) {
|
2021-11-08 14:18:25 -05:00
|
|
|
+ // Will be nullptr if SandboxInterfaceInfo was not initialized by the CEF
|
|
|
|
+ // client, meaning that the sandbox is implicitly disabled.
|
|
|
|
+ if (!g_broker_services) {
|
2024-10-24 11:05:31 -04:00
|
|
|
+ base::Process process;
|
|
|
|
+ ResultCode result =
|
|
|
|
+ LaunchWithoutSandbox(cmd_line, handles_to_inherit, delegate, &process);
|
|
|
|
+ DWORD last_error = GetLastError();
|
|
|
|
+ std::move(result_callback).Run(std::move(process), last_error, result);
|
|
|
|
+ return SBOX_ALL_OK;
|
2021-11-08 14:18:25 -05:00
|
|
|
+ }
|
|
|
|
+
|
2024-02-22 13:36:15 -05:00
|
|
|
SandboxLaunchTimer timer;
|
2022-08-22 21:37:40 -04:00
|
|
|
|
|
|
|
// Avoid making a policy if we won't use it.
|