| Index: sandbox/linux/seccomp-bpf/trap.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/trap.cc b/sandbox/linux/seccomp-bpf/trap.cc
|
| index c87bb006129d15d006034daf36323f434b51ff6a..145e62469cacca37c07aa40916c1d27795082c11 100644
|
| --- a/sandbox/linux/seccomp-bpf/trap.cc
|
| +++ b/sandbox/linux/seccomp-bpf/trap.cc
|
| @@ -251,10 +251,6 @@ bool Trap::TrapKey::operator<(const TrapKey& o) const {
|
| }
|
| }
|
|
|
| -uint16_t Trap::MakeTrap(TrapFnc fnc, const void* aux, bool safe) {
|
| - return Registry()->Add(fnc, aux, safe);
|
| -}
|
| -
|
| uint16_t Trap::Add(TrapFnc fnc, const void* aux, bool safe) {
|
| if (!safe && !SandboxDebuggingAllowedByUser()) {
|
| // Unless the user set the CHROME_SANDBOX_DEBUGGING environment variable,
|
| @@ -353,15 +349,11 @@ uint16_t Trap::Add(TrapFnc fnc, const void* aux, bool safe) {
|
| return id;
|
| }
|
|
|
| -bool Trap::SandboxDebuggingAllowedByUser() const {
|
| +bool Trap::SandboxDebuggingAllowedByUser() {
|
| const char* debug_flag = getenv(kSandboxDebuggingEnv);
|
| return debug_flag && *debug_flag;
|
| }
|
|
|
| -bool Trap::EnableUnsafeTrapsInSigSysHandler() {
|
| - return Registry()->EnableUnsafeTraps();
|
| -}
|
| -
|
| bool Trap::EnableUnsafeTraps() {
|
| if (!has_unsafe_traps_) {
|
| // Unsafe traps are a one-way fuse. Once enabled, they can never be turned
|
|
|