Index: sandbox/linux/seccomp-bpf/sandbox_bpf.cc |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc |
index dc29f2252a21e28773816d39996376914dceec14..31975a1b98e33539d60a977cf70e789d09ecd6d5 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc |
@@ -79,14 +79,6 @@ |
} |
} |
-uint64_t EscapePC() { |
- intptr_t rv = Syscall::Call(-1); |
- if (rv == -1 && errno == ENOSYS) { |
- return 0; |
- } |
- return static_cast<uint64_t>(static_cast<uintptr_t>(rv)); |
-} |
- |
} // namespace |
SandboxBPF::SandboxBPF(bpf_dsl::Policy* policy) |
@@ -193,9 +185,6 @@ |
#endif |
DCHECK(policy_); |
bpf_dsl::PolicyCompiler compiler(policy_.get(), Trap::Registry()); |
- if (Trap::SandboxDebuggingAllowedByUser()) { |
- compiler.DangerousSetEscapePC(EscapePC()); |
- } |
scoped_ptr<CodeGen::Program> program = compiler.Compile(); |
// Make sure compilation resulted in a BPF program that executes |