Index: sandbox/linux/seccomp-bpf/trap.cc |
diff --git a/sandbox/linux/seccomp-bpf/trap.cc b/sandbox/linux/seccomp-bpf/trap.cc |
index c87bb006129d15d006034daf36323f434b51ff6a..145e62469cacca37c07aa40916c1d27795082c11 100644 |
--- a/sandbox/linux/seccomp-bpf/trap.cc |
+++ b/sandbox/linux/seccomp-bpf/trap.cc |
@@ -251,10 +251,6 @@ bool Trap::TrapKey::operator<(const TrapKey& o) const { |
} |
} |
-uint16_t Trap::MakeTrap(TrapFnc fnc, const void* aux, bool safe) { |
- return Registry()->Add(fnc, aux, safe); |
-} |
- |
uint16_t Trap::Add(TrapFnc fnc, const void* aux, bool safe) { |
if (!safe && !SandboxDebuggingAllowedByUser()) { |
// Unless the user set the CHROME_SANDBOX_DEBUGGING environment variable, |
@@ -353,15 +349,11 @@ uint16_t Trap::Add(TrapFnc fnc, const void* aux, bool safe) { |
return id; |
} |
-bool Trap::SandboxDebuggingAllowedByUser() const { |
+bool Trap::SandboxDebuggingAllowedByUser() { |
const char* debug_flag = getenv(kSandboxDebuggingEnv); |
return debug_flag && *debug_flag; |
} |
-bool Trap::EnableUnsafeTrapsInSigSysHandler() { |
- return Registry()->EnableUnsafeTraps(); |
-} |
- |
bool Trap::EnableUnsafeTraps() { |
if (!has_unsafe_traps_) { |
// Unsafe traps are a one-way fuse. Once enabled, they can never be turned |