2021-11-08 20:18:25 +01:00
|
|
|
diff --git sandbox/policy/win/sandbox_win.cc sandbox/policy/win/sandbox_win.cc
|
2022-03-26 02:12:30 +01:00
|
|
|
index d916c59c1d4fe..7cc9401e19800 100644
|
2021-11-08 20:18:25 +01:00
|
|
|
--- sandbox/policy/win/sandbox_win.cc
|
|
|
|
+++ sandbox/policy/win/sandbox_win.cc
|
2022-03-26 02:12:30 +01:00
|
|
|
@@ -1154,6 +1154,13 @@ ResultCode SandboxWin::StartSandboxedProcess(
|
2021-11-08 20:18:25 +01:00
|
|
|
const base::HandlesToInheritVector& handles_to_inherit,
|
|
|
|
SandboxDelegate* delegate,
|
|
|
|
base::Process* process) {
|
|
|
|
+ // Will be nullptr if SandboxInterfaceInfo was not initialized by the CEF
|
|
|
|
+ // client, meaning that the sandbox is implicitly disabled.
|
|
|
|
+ if (!g_broker_services) {
|
|
|
|
+ return LaunchWithoutSandbox(cmd_line, handles_to_inherit, delegate,
|
|
|
|
+ process);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
scoped_refptr<TargetPolicy> policy = g_broker_services->CreatePolicy();
|
|
|
|
ResultCode result = GeneratePolicyForSandboxedProcess(
|
|
|
|
cmd_line, process_type, handles_to_inherit, delegate, policy);
|