116ac059a3
Drop parts of build.patch.1 and the entire include.patch, which are probably obsolete and don't apply anymore. Change-Id: I18c8d5e2ee97c7793e75ac0e47b5705b99585d59 Reviewed-on: https://gerrit.libreoffice.org/c/core/+/166415 Tested-by: Jenkins Reviewed-by: Miklos Vajna <vmiklos@collabora.com>
34 lines
1.2 KiB
Groff
34 lines
1.2 KiB
Groff
diff --git a/core/fxcrt/win/win_util.cc b/core/fxcrt/win/win_util.cc
|
|
index 43e9151d1..76657ac0a 100644
|
|
--- a/core/fxcrt/win/win_util.cc
|
|
+++ b/core/fxcrt/win/win_util.cc
|
|
@@ -10,28 +10,7 @@
|
|
namespace pdfium {
|
|
|
|
bool IsUser32AndGdi32Available() {
|
|
- static auto is_user32_and_gdi32_available = []() {
|
|
- // If win32k syscalls aren't disabled, then user32 and gdi32 are available.
|
|
-
|
|
- typedef decltype(
|
|
- GetProcessMitigationPolicy)* GetProcessMitigationPolicyType;
|
|
- GetProcessMitigationPolicyType get_process_mitigation_policy_func =
|
|
- reinterpret_cast<GetProcessMitigationPolicyType>(GetProcAddress(
|
|
- GetModuleHandle(L"kernel32.dll"), "GetProcessMitigationPolicy"));
|
|
-
|
|
- if (!get_process_mitigation_policy_func)
|
|
- return true;
|
|
-
|
|
- PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {};
|
|
- if (get_process_mitigation_policy_func(GetCurrentProcess(),
|
|
- ProcessSystemCallDisablePolicy,
|
|
- &policy, sizeof(policy))) {
|
|
- return policy.DisallowWin32kSystemCalls == 0;
|
|
- }
|
|
-
|
|
- return true;
|
|
- }();
|
|
- return is_user32_and_gdi32_available;
|
|
+ return true;
|
|
}
|
|
|
|
} // namespace pdfium
|