DescriptionRevert of bpf_dsl: decouple PolicyCompiler from Syscall (patchset #3 id:40001 of https://codereview.chromium.org/939943002/)
Reason for revert:
This CL seem to increase nacl_helper size and results in Linux_x64 failure.
Original issue's description:
> bpf_dsl: decouple PolicyCompiler from Syscall
>
> Logically, the "escape hatch PC" is now like a compiler flag, that the
> user can set appropriately. In the case of SandboxBPF, it will set the
> PC to Syscall::Call(-1), as before.
>
> This isn't a very satisfying way to resolve this cyclic dependency, but
> it's the simplest and least intrusive I could think of.
>
> BUG=449357
>
> Committed: https://crrev.com/242ad8711d9f0d58fb45b134468ad68b0835fad2
> Cr-Commit-Position: refs/heads/master@{#317237}
TBR=jln@chromium.org,mdempsky@chromium.org
NOPRESUBMIT=true
NOTREECHECKS=true
NOTRY=true
BUG=449357
Committed: https://crrev.com/e83e901c290d599fcbd82da8a436d520aca94879
Cr-Commit-Position: refs/heads/master@{#317295}
Patch Set 1 #
Created: 5 years, 10 months ago
(Patch set is too large to download)
Messages
Total messages: 20 (6 generated)
|