Index: content/common/sandbox_linux/bpf_ppapi_policy_linux.cc |
diff --git a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc |
index 9e0e257e0b74fae121aa7f41c02d9a250e168c43..3a59bfc25d948c63e20bd9f8d54eb47c731018a8 100644 |
--- a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc |
+++ b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc |
@@ -18,18 +18,6 @@ using sandbox::SyscallSets; |
namespace content { |
-namespace { |
- |
-inline bool IsUsingToolKitGtk() { |
-#if defined(TOOLKIT_GTK) |
- return true; |
-#else |
- return false; |
-#endif |
-} |
- |
-} // namespace |
- |
PpapiProcessPolicy::PpapiProcessPolicy() {} |
PpapiProcessPolicy::~PpapiProcessPolicy() {} |
@@ -51,17 +39,6 @@ ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, |
case __NR_ioctl: |
return ErrorCode(ENOTTY); // Flash Access. |
default: |
- if (IsUsingToolKitGtk()) { |
-#if defined(__x86_64__) || defined(__arm__) |
- if (SyscallSets::IsSystemVSharedMemory(sysno)) |
- return ErrorCode(ErrorCode::ERR_ALLOWED); |
-#endif |
-#if defined(__i386__) |
- if (SyscallSets::IsSystemVIpc(sysno)) |
- return ErrorCode(ErrorCode::ERR_ALLOWED); |
-#endif |
- } |
- |
// Default on the baseline policy. |
return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno); |
} |