| Index: sandbox/linux/bpf_dsl/bpf_dsl.h
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl.h b/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| index bbd92a130e8a5c75ae9c5cbc0702c5b6d496bfe8..25892b7eff51f82583c890c0bcac06970d772917 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| @@ -16,14 +16,6 @@
|
| #include "sandbox/linux/bpf_dsl/trap_registry.h"
|
| #include "sandbox/sandbox_export.h"
|
|
|
| -namespace sandbox {
|
| -class ErrorCode;
|
| -class Verifier;
|
| -namespace bpf_dsl {
|
| -class PolicyCompiler;
|
| -}
|
| -}
|
| -
|
| // The sandbox::bpf_dsl namespace provides a domain-specific language
|
| // to make writing BPF policies more expressive. In general, the
|
| // object types all have value semantics (i.e., they can be copied
|
| @@ -127,14 +119,6 @@ class SANDBOX_EXPORT SandboxBPFDSLPolicy {
|
| static ResultExpr Trap(TrapRegistry::TrapFnc trap_func, const void* aux);
|
|
|
| private:
|
| - friend PolicyCompiler;
|
| - friend Verifier;
|
| -
|
| - // Private methods used for compiling and verifying policies.
|
| - ErrorCode EvaluateSyscall(PolicyCompiler* pc, int sysno) const;
|
| - ErrorCode InvalidSyscall(PolicyCompiler* pc) const;
|
| - bool HasUnsafeTraps() const;
|
| -
|
| DISALLOW_COPY_AND_ASSIGN(SandboxBPFDSLPolicy);
|
| };
|
|
|
|
|