diff --git a/sandboxed_api/sandbox2/policybuilder.cc b/sandboxed_api/sandbox2/policybuilder.cc index 0a29714..14fadc2 100644 --- a/sandboxed_api/sandbox2/policybuilder.cc +++ b/sandboxed_api/sandbox2/policybuilder.cc @@ -113,19 +113,6 @@ PolicyBuilder& PolicyBuilder::OverridableBlockSyscallWithErrno(uint32_t num, return *this; } -PolicyBuilder& PolicyBuilder::AllowEpoll() { - return AllowSyscalls({ - __NR_epoll_create, - __NR_epoll_create1, - __NR_epoll_ctl, - __NR_epoll_wait, - __NR_epoll_pwait, -#ifdef __NR_epoll_pwait2 - __NR_epoll_pwait2, -#endif - }); -} - PolicyBuilder& PolicyBuilder::AllowExit() { return AllowSyscalls({__NR_exit, __NR_exit_group}); } diff --git a/sandboxed_api/sandbox2/policybuilder.h b/sandboxed_api/sandbox2/policybuilder.h index eccff24..345bada 100644 --- a/sandboxed_api/sandbox2/policybuilder.h +++ b/sandboxed_api/sandbox2/policybuilder.h @@ -120,16 +120,6 @@ class PolicyBuilder final { // Appends code to block a specific syscall and setting errno. PolicyBuilder& BlockSyscallWithErrno(uint32_t num, int error); - // Appends code to allow using epoll. - // Allows these syscalls: - // - epoll_create - // - epoll_create1 - // - epoll_ctl - // - epoll_wait - // - epoll_pwait - // - epoll_pwait2 - PolicyBuilder& AllowEpoll(); - // Appends code to allow exiting. // Allows these syscalls: // - exit