summaryrefslogtreecommitdiffstats
path: root/content/browser/renderer_host/render_sandbox_host_linux.cc
diff options
context:
space:
mode:
authormdempsky@chromium.org <mdempsky@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-04-23 08:54:16 +0000
committermdempsky@chromium.org <mdempsky@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-04-23 08:54:16 +0000
commit41101f86728169e7f22480979591b40b90cb6435 (patch)
tree659a04a49a4907fea1a7ee175d450f92f8c6fff4 /content/browser/renderer_host/render_sandbox_host_linux.cc
parent8d4ff17dc2992c6d2c6130b06d246b9e707cf0e4 (diff)
downloadchromium_src-41101f86728169e7f22480979591b40b90cb6435.zip
chromium_src-41101f86728169e7f22480979591b40b90cb6435.tar.gz
chromium_src-41101f86728169e7f22480979591b40b90cb6435.tar.bz2
Remove socket hacks for FreeBSD and OpenBSD
Support for UNIX-domain SOCK_SEQPACKET sockets was added in FreeBSD 9 (Jan 2012) and OpenBSD 5.0 (Nov 2011): http://www.freebsd.org/cgi/man.cgi?query=unix&sektion=4&manpath=FreeBSD+9.0-RELEASE&format=html http://www.openbsd.org/cgi-bin/man.cgi?query=unix&sektion=4&manpath=OpenBSD+5.0&format=html Review URL: https://codereview.chromium.org/247733004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@265588 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/browser/renderer_host/render_sandbox_host_linux.cc')
-rw-r--r--content/browser/renderer_host/render_sandbox_host_linux.cc9
1 files changed, 1 insertions, 8 deletions
diff --git a/content/browser/renderer_host/render_sandbox_host_linux.cc b/content/browser/renderer_host/render_sandbox_host_linux.cc
index 2aea9ed..b0ef6f0 100644
--- a/content/browser/renderer_host/render_sandbox_host_linux.cc
+++ b/content/browser/renderer_host/render_sandbox_host_linux.cc
@@ -724,17 +724,10 @@ void RenderSandboxHostLinux::Init(const std::string& sandbox_path) {
// We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from
// sending datagrams to other sockets on the system. The sandbox may prevent
// the renderer from calling socket() to create new sockets, but it'll still
- // inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send
+ // inherit some sockets. With AF_UNIX+SOCK_DGRAM, it can call sendmsg to send
// a datagram to any (abstract) socket on the same system. With
// SOCK_SEQPACKET, this is prevented.
-#if defined(OS_FREEBSD) || defined(OS_OPENBSD)
- // The BSDs often don't support SOCK_SEQPACKET yet, so fall back to
- // SOCK_DGRAM if necessary.
- if (socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) != 0)
- CHECK(socketpair(AF_UNIX, SOCK_DGRAM, 0, fds) == 0);
-#else
CHECK(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) == 0);
-#endif
renderer_socket_ = fds[0];
const int browser_socket = fds[1];