| Index: sandbox/linux/seccomp-bpf/verifier.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/verifier.cc b/sandbox/linux/seccomp-bpf/verifier.cc
|
| index 707bc45efd68852db0f82dfb6ca280ee58f910d0..0c344b0f23011f2bf5a135fa0a078445bcdad4ca 100644
|
| --- a/sandbox/linux/seccomp-bpf/verifier.cc
|
| +++ b/sandbox/linux/seccomp-bpf/verifier.cc
|
| @@ -318,8 +318,7 @@ bool Verifier::VerifyBPF(bpf_dsl::PolicyCompiler* compiler,
|
| const bpf_dsl::SandboxBPFDSLPolicy& policy,
|
| const char** err) {
|
| *err = NULL;
|
| - for (SyscallIterator iter(false); !iter.Done();) {
|
| - uint32_t sysnum = iter.Next();
|
| + for (uint32_t sysnum : SyscallSet::All()) {
|
| // We ideally want to iterate over the full system call range and values
|
| // just above and just below this range. This gives us the full result set
|
| // of the "evaluators".
|
| @@ -340,7 +339,7 @@ bool Verifier::VerifyBPF(bpf_dsl::PolicyCompiler* compiler,
|
| }
|
| #endif
|
| #endif
|
| - ErrorCode code = iter.IsValid(sysnum)
|
| + ErrorCode code = SyscallSet::IsValid(sysnum)
|
| ? policy.EvaluateSyscall(sysnum)->Compile(compiler)
|
| : policy.InvalidSyscall()->Compile(compiler);
|
| if (!VerifyErrorCode(compiler, program, &data, code, code, err)) {
|
|
|