Index: content/common/sandbox_linux/bpf_renderer_policy_linux.cc |
diff --git a/content/common/sandbox_linux/bpf_renderer_policy_linux.cc b/content/common/sandbox_linux/bpf_renderer_policy_linux.cc |
index f4c19a680127a73f11d8c728f68ddc8eb9fee032..eba2ecafe29d362e47e965c1ac5ce87e58350254 100644 |
--- a/content/common/sandbox_linux/bpf_renderer_policy_linux.cc |
+++ b/content/common/sandbox_linux/bpf_renderer_policy_linux.cc |
@@ -18,18 +18,6 @@ using sandbox::SyscallSets; |
namespace content { |
-namespace { |
- |
-inline bool IsUsingToolKitGtk() { |
-#if defined(TOOLKIT_GTK) |
- return true; |
-#else |
- return false; |
-#endif |
-} |
- |
-} // namespace |
- |
RendererProcessPolicy::RendererProcessPolicy() {} |
RendererProcessPolicy::~RendererProcessPolicy() {} |
@@ -72,17 +60,6 @@ ErrorCode RendererProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox, |
case __NR_prlimit64: |
return ErrorCode(EPERM); // See crbug.com/160157. |
default: |
- if (IsUsingToolKitGtk()) { |
-#if defined(__x86_64__) || defined(__arm__) |
- if (SyscallSets::IsSystemVSharedMemory(sysno)) |
- return ErrorCode(ErrorCode::ERR_ALLOWED); |
-#endif |
-#if defined(__i386__) |
- if (SyscallSets::IsSystemVIpc(sysno)) |
- return ErrorCode(ErrorCode::ERR_ALLOWED); |
-#endif |
- } |
- |
// Default on the content baseline policy. |
return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno); |
} |