| Index: content/common/sandbox_linux/bpf_renderer_policy_linux.cc
|
| diff --git a/content/common/sandbox_linux/bpf_renderer_policy_linux.cc b/content/common/sandbox_linux/bpf_renderer_policy_linux.cc
|
| index f4c19a680127a73f11d8c728f68ddc8eb9fee032..eba2ecafe29d362e47e965c1ac5ce87e58350254 100644
|
| --- a/content/common/sandbox_linux/bpf_renderer_policy_linux.cc
|
| +++ b/content/common/sandbox_linux/bpf_renderer_policy_linux.cc
|
| @@ -18,18 +18,6 @@ using sandbox::SyscallSets;
|
|
|
| namespace content {
|
|
|
| -namespace {
|
| -
|
| -inline bool IsUsingToolKitGtk() {
|
| -#if defined(TOOLKIT_GTK)
|
| - return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| RendererProcessPolicy::RendererProcessPolicy() {}
|
| RendererProcessPolicy::~RendererProcessPolicy() {}
|
|
|
| @@ -72,17 +60,6 @@ ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
|
| case __NR_prlimit64:
|
| return ErrorCode(EPERM); // See crbug.com/160157.
|
| default:
|
| - if (IsUsingToolKitGtk()) {
|
| -#if defined(__x86_64__) || defined(__arm__)
|
| - if (SyscallSets::IsSystemVSharedMemory(sysno))
|
| - return ErrorCode(ErrorCode::ERR_ALLOWED);
|
| -#endif
|
| -#if defined(__i386__)
|
| - if (SyscallSets::IsSystemVIpc(sysno))
|
| - return ErrorCode(ErrorCode::ERR_ALLOWED);
|
| -#endif
|
| - }
|
| -
|
| // Default on the content baseline policy.
|
| return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
| }
|
|
|