summaryrefslogtreecommitdiff
path: root/external/pdfium/windows7.patch.1
diff options
context:
space:
mode:
Diffstat (limited to 'external/pdfium/windows7.patch.1')
-rw-r--r--external/pdfium/windows7.patch.160
1 files changed, 30 insertions, 30 deletions
diff --git a/external/pdfium/windows7.patch.1 b/external/pdfium/windows7.patch.1
index 00603c0570cb..d33f273ff4ca 100644
--- a/external/pdfium/windows7.patch.1
+++ b/external/pdfium/windows7.patch.1
@@ -1,34 +1,34 @@
diff --git a/third_party/base/win/win_util.cc b/third_party/base/win/win_util.cc
-index 9c90b9d62..356eca74d 100644
+index ae2dba84d..7a3718848 100644
--- a/third_party/base/win/win_util.cc
+++ b/third_party/base/win/win_util.cc
@@ -12,28 +12,7 @@ namespace base {
- namespace win {
-
- bool IsUser32AndGdi32Available() {
-- static auto is_user32_and_gdi32_available = []() {
-- // If win32k syscalls aren't disabled, then user32 and gdi32 are available.
--
-- typedef decltype(
-- GetProcessMitigationPolicy)* GetProcessMitigationPolicyType;
-- GetProcessMitigationPolicyType get_process_mitigation_policy_func =
-- reinterpret_cast<GetProcessMitigationPolicyType>(GetProcAddress(
-- GetModuleHandle(L"kernel32.dll"), "GetProcessMitigationPolicy"));
--
-- if (!get_process_mitigation_policy_func)
-- return true;
--
-- PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {};
-- if (get_process_mitigation_policy_func(GetCurrentProcess(),
-- ProcessSystemCallDisablePolicy,
-- &policy, sizeof(policy))) {
-- return policy.DisallowWin32kSystemCalls == 0;
-- }
--
-- return true;
-- }();
-- return is_user32_and_gdi32_available;
-+ return true;
- }
-
- } // namespace win
+ namespace win {
+
+ bool IsUser32AndGdi32Available() {
+- static auto is_user32_and_gdi32_available = []() {
+- // If win32k syscalls aren't disabled, then user32 and gdi32 are available.
+-
+- typedef decltype(
+- GetProcessMitigationPolicy)* GetProcessMitigationPolicyType;
+- GetProcessMitigationPolicyType get_process_mitigation_policy_func =
+- reinterpret_cast<GetProcessMitigationPolicyType>(GetProcAddress(
+- GetModuleHandle(L"kernel32.dll"), "GetProcessMitigationPolicy"));
+-
+- if (!get_process_mitigation_policy_func)
+- return true;
+-
+- PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {};
+- if (get_process_mitigation_policy_func(GetCurrentProcess(),
+- ProcessSystemCallDisablePolicy,
+- &policy, sizeof(policy))) {
+- return policy.DisallowWin32kSystemCalls == 0;
+- }
+-
+- return true;
+- }();
+- return is_user32_and_gdi32_available;
++ return true;
+ }
+
+ } // namespace win