| Index: sandbox/linux/seccomp-bpf/instruction.h
|
| diff --git a/sandbox/linux/seccomp-bpf/instruction.h b/sandbox/linux/seccomp-bpf/instruction.h
|
| deleted file mode 100644
|
| index 70b7791f9122ffae04004b53ba37ead8c4a1a2b3..0000000000000000000000000000000000000000
|
| --- a/sandbox/linux/seccomp-bpf/instruction.h
|
| +++ /dev/null
|
| @@ -1,60 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef SANDBOX_LINUX_SECCOMP_BPF_INSTRUCTION_H__
|
| -#define SANDBOX_LINUX_SECCOMP_BPF_INSTRUCTION_H__
|
| -
|
| -#include <stdint.h>
|
| -
|
| -#include <cstddef>
|
| -
|
| -namespace sandbox {
|
| -
|
| -// The fields in this structure have the same meaning as the corresponding
|
| -// fields in "struct sock_filter". See <linux/filter.h> for a lot more
|
| -// detail.
|
| -// code -- Opcode of the instruction. This is typically a bitwise
|
| -// combination BPF_XXX values.
|
| -// k -- Operand; BPF instructions take zero or one operands. Operands
|
| -// are 32bit-wide constants, if present. They can be immediate
|
| -// values (if BPF_K is present in "code_"), addresses (if BPF_ABS
|
| -// is present in "code_"), or relative jump offsets (if BPF_JMP
|
| -// and BPF_JA are present in "code_").
|
| -// jt, jf -- all conditional jumps have a 8bit-wide jump offset that allows
|
| -// jumps of up to 256 instructions forward. Conditional jumps are
|
| -// identified by BPF_JMP in "code_", but the lack of BPF_JA.
|
| -// Conditional jumps have a "t"rue and "f"alse branch.
|
| -struct Instruction {
|
| - // Constructor for an non-jumping instruction or for an unconditional
|
| - // "always" jump.
|
| - Instruction(uint16_t c, uint32_t parm, Instruction* n)
|
| - : code(c), jt(0), jf(0), jt_ptr(NULL), jf_ptr(NULL), next(n), k(parm) {}
|
| -
|
| - // Constructor for a conditional jump instruction.
|
| - Instruction(uint16_t c, uint32_t parm, Instruction* jt, Instruction* jf)
|
| - : code(c), jt(0), jf(0), jt_ptr(jt), jf_ptr(jf), next(NULL), k(parm) {}
|
| -
|
| - uint16_t code;
|
| -
|
| - // When code generation is complete, we will have computed relative
|
| - // branch targets that are in the range 0..255.
|
| - uint8_t jt, jf;
|
| -
|
| - // While assembling the BPF program, we use pointers for branch targets.
|
| - // Once we have computed basic blocks, these pointers will be entered as
|
| - // keys in a TargetsToBlocks map and should no longer be dereferenced
|
| - // directly.
|
| - Instruction* jt_ptr, *jf_ptr;
|
| -
|
| - // While assembling the BPF program, non-jumping instructions are linked
|
| - // by the "next_" pointer. This field is no longer needed when we have
|
| - // computed basic blocks.
|
| - Instruction* next;
|
| -
|
| - uint32_t k;
|
| -};
|
| -
|
| -} // namespace sandbox
|
| -
|
| -#endif // SANDBOX_LINUX_SECCOMP_BPF_INSTRUCTION_H__
|
|
|