Index: sandbox/linux/bpf_dsl/policy_compiler.h |
diff --git a/sandbox/linux/bpf_dsl/policy_compiler.h b/sandbox/linux/bpf_dsl/policy_compiler.h |
index d648c0290230a09e1e9ad3313ee04d90f3b08977..faf6be5c36257eef1723621fedee40430b9e9f99 100644 |
--- a/sandbox/linux/bpf_dsl/policy_compiler.h |
+++ b/sandbox/linux/bpf_dsl/policy_compiler.h |
@@ -33,10 +33,6 @@ |
// Compile registers any trap handlers needed by the policy and |
// compiles the policy to a BPF program, which it returns. |
scoped_ptr<CodeGen::Program> Compile(); |
- |
- // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any |
- // system calls, regardless of policy. |
- void DangerousSetEscapePC(uint64_t escapepc); |
// Error returns an ErrorCode to indicate the system call should fail with |
// the specified error number. |
@@ -92,7 +88,7 @@ |
CodeGen::Node CheckArch(CodeGen::Node passed); |
// If |has_unsafe_traps_| is true, returns an instruction sequence |
- // that allows all system calls from |escapepc_|, and otherwise |
+ // that allows all system calls from Syscall::Call(), and otherwise |
// passes control to |rest|. Otherwise, simply returns |rest|. |
CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); |
@@ -144,7 +140,6 @@ |
const Policy* policy_; |
TrapRegistry* registry_; |
- uint64_t escapepc_; |
Conds conds_; |
CodeGen gen_; |