2021-11-08 20:18:25 +01:00
|
|
|
diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc
|
2024-10-24 17:05:31 +02:00
|
|
|
index b550651a8a981..f5664314075dc 100644
|
2021-11-08 20:18:25 +01:00
|
|
|
--- sandbox/policy/win/sandbox_win.cc
|
|
|
|
+++ sandbox/policy/win/sandbox_win.cc
|
2024-10-24 17:05:31 +02:00
|
|
|
@@ -963,6 +963,17 @@ ResultCode SandboxWin::StartSandboxedProcess(
|
2021-11-08 20:18:25 +01:00
|
|
|
const base::HandlesToInheritVector& handles_to_inherit,
|
|
|
|
SandboxDelegate* delegate,
|
2024-10-24 17:05:31 +02:00
|
|
|
StartSandboxedProcessCallback result_callback) {
|
2021-11-08 20:18:25 +01:00
|
|
|
+ // Will be nullptr if SandboxInterfaceInfo was not initialized by the CEF
|
|
|
|
+ // client, meaning that the sandbox is implicitly disabled.
|
|
|
|
+ if (!g_broker_services) {
|
2024-10-24 17:05:31 +02:00
|
|
|
+ base::Process process;
|
|
|
|
+ ResultCode result =
|
|
|
|
+ LaunchWithoutSandbox(cmd_line, handles_to_inherit, delegate, &process);
|
|
|
|
+ DWORD last_error = GetLastError();
|
|
|
|
+ std::move(result_callback).Run(std::move(process), last_error, result);
|
|
|
|
+ return SBOX_ALL_OK;
|
2021-11-08 20:18:25 +01:00
|
|
|
+ }
|
|
|
|
+
|
2024-02-22 19:36:15 +01:00
|
|
|
SandboxLaunchTimer timer;
|
2022-08-23 03:37:40 +02:00
|
|
|
|
|
|
|
// Avoid making a policy if we won't use it.
|