| Index: sandbox/linux/bpf_dsl/verifier.cc
|
| diff --git a/sandbox/linux/bpf_dsl/verifier.cc b/sandbox/linux/bpf_dsl/verifier.cc
|
| index 417c663e306d28caa15122669b9251d0ce7a8236..7b2dc50f1e1d857366bdb549dacdc6256b83122e 100644
|
| --- a/sandbox/linux/bpf_dsl/verifier.cc
|
| +++ b/sandbox/linux/bpf_dsl/verifier.cc
|
| @@ -10,11 +10,11 @@
|
|
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
|
| +#include "sandbox/linux/bpf_dsl/errorcode.h"
|
| #include "sandbox/linux/bpf_dsl/policy.h"
|
| #include "sandbox/linux/bpf_dsl/policy_compiler.h"
|
| #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
|
| #include "sandbox/linux/bpf_dsl/syscall_set.h"
|
| -#include "sandbox/linux/seccomp-bpf/errorcode.h"
|
| #include "sandbox/linux/system_headers/linux_filter.h"
|
| #include "sandbox/linux/system_headers/linux_seccomp.h"
|
|
|
| @@ -368,12 +368,12 @@ uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program,
|
| case BPF_RET: {
|
| uint32_t r = Ret(&state, insn, err);
|
| switch (r & SECCOMP_RET_ACTION) {
|
| - case SECCOMP_RET_TRAP:
|
| + case SECCOMP_RET_ALLOW:
|
| case SECCOMP_RET_ERRNO:
|
| + case SECCOMP_RET_KILL:
|
| case SECCOMP_RET_TRACE:
|
| - case SECCOMP_RET_ALLOW:
|
| + case SECCOMP_RET_TRAP:
|
| break;
|
| - case SECCOMP_RET_KILL: // We don't ever generate this
|
| case SECCOMP_RET_INVALID: // Should never show up in BPF program
|
| default:
|
| *err = "Unexpected return code found in BPF program";
|
|
|