Index: sandbox/linux/seccomp-bpf/sandbox_bpf.h |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
index 923a9f3b1752535d45e966cdb9515cca0e394c2a..9bb414a61e6a98913973bfb1b3d4a8f4fb5558e4 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
@@ -65,14 +65,6 @@ class SANDBOX_EXPORT SandboxBPF { |
PROCESS_MULTI_THREADED, // The program may be multi-threaded. |
}; |
- // When calling setSandboxPolicy(), the caller can provide an arbitrary |
- // pointer in |aux|. This pointer will then be forwarded to the sandbox |
- // policy each time a call is made through an EvaluateSyscall function |
- // pointer. One common use case would be to pass the "aux" pointer as an |
- // argument to Trap() functions. |
- typedef ErrorCode (*EvaluateSyscall)(SandboxBPF* sandbox_compiler, |
- int system_call_number, |
- void* aux); |
// A vector of BPF instructions that need to be installed as a filter |
// program in the kernel. |
typedef std::vector<struct sock_filter> Program; |
@@ -109,20 +101,6 @@ class SANDBOX_EXPORT SandboxBPF { |
// eventually close it when "StartSandbox()" executes. |
void set_proc_fd(int proc_fd); |
- // The system call evaluator function is called with the system |
- // call number. It can decide to allow the system call unconditionally |
- // by returning ERR_ALLOWED; it can deny the system call unconditionally by |
- // returning an appropriate "errno" value; or it can request inspection |
- // of system call argument(s) by returning a suitable ErrorCode. |
- // The "aux" parameter can be used to pass optional data to the system call |
- // evaluator. There are different possible uses for this data, but one of the |
- // use cases would be for the policy to then forward this pointer to a Trap() |
- // handler. In this case, of course, the data that is pointed to must remain |
- // valid for the entire time that Trap() handlers can be called; typically, |
- // this would be the lifetime of the program. |
- // DEPRECATED: use the policy interface below. |
- void SetSandboxPolicyDeprecated(EvaluateSyscall syscallEvaluator, void* aux); |
- |
// Set the BPF policy as |policy|. Ownership of |policy| is transfered here |
// to the sandbox object. |
void SetSandboxPolicy(SandboxBPFPolicy* policy); |
@@ -229,8 +207,7 @@ class SANDBOX_EXPORT SandboxBPF { |
// policy. The caller has to make sure that "this" has not yet been |
// initialized with any other policies. |
bool RunFunctionInPolicy(void (*code_in_sandbox)(), |
- EvaluateSyscall syscall_evaluator, |
- void* aux); |
+ scoped_ptr<SandboxBPFPolicy> policy); |
// Performs a couple of sanity checks to verify that the kernel supports the |
// features that we need for successful sandboxing. |