| Index: sandbox/linux/bpf_dsl/bpf_dsl.cc
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl.cc b/sandbox/linux/bpf_dsl/bpf_dsl.cc
|
| index f29aeec609825db3a6e7ae80952018d5d98fe9a6..ffabeac6da5464ce27b8fe2cf117296e7ed73b11 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl.cc
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl.cc
|
| @@ -13,7 +13,6 @@
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
|
| #include "sandbox/linux/bpf_dsl/policy_compiler.h"
|
| #include "sandbox/linux/seccomp-bpf/errorcode.h"
|
| -#include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
|
|
|
| namespace sandbox {
|
| namespace bpf_dsl {
|
| @@ -377,26 +376,6 @@ ResultExpr SandboxBPFDSLPolicy::InvalidSyscall() const {
|
| return Error(ENOSYS);
|
| }
|
|
|
| -ErrorCode SandboxBPFDSLPolicy::EvaluateSyscall(PolicyCompiler* pc,
|
| - int sysno) const {
|
| - return EvaluateSyscall(sysno)->Compile(pc);
|
| -}
|
| -
|
| -ErrorCode SandboxBPFDSLPolicy::InvalidSyscall(PolicyCompiler* pc) const {
|
| - return InvalidSyscall()->Compile(pc);
|
| -}
|
| -
|
| -bool SandboxBPFDSLPolicy::HasUnsafeTraps() const {
|
| - for (SyscallIterator iter(false); !iter.Done();) {
|
| - uint32_t sysnum = iter.Next();
|
| - if (SyscallIterator::IsValid(sysnum) &&
|
| - EvaluateSyscall(sysnum)->HasUnsafeTraps()) {
|
| - return true;
|
| - }
|
| - }
|
| - return InvalidSyscall()->HasUnsafeTraps();
|
| -}
|
| -
|
| ResultExpr SandboxBPFDSLPolicy::Trap(TrapRegistry::TrapFnc trap_func,
|
| const void* aux) {
|
| return bpf_dsl::Trap(trap_func, aux);
|
|
|