Index: sandbox/linux/seccomp-bpf/verifier.cc |
diff --git a/sandbox/linux/seccomp-bpf/verifier.cc b/sandbox/linux/seccomp-bpf/verifier.cc |
index 07b13d6f61665cee15dcda1bcd80064bdfc69dcd..0863556e0808e7e28d4805b0245dda7fa390bdd3 100644 |
--- a/sandbox/linux/seccomp-bpf/verifier.cc |
+++ b/sandbox/linux/seccomp-bpf/verifier.cc |
@@ -423,10 +423,10 @@ uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program, |
switch (r & SECCOMP_RET_ACTION) { |
case SECCOMP_RET_TRAP: |
case SECCOMP_RET_ERRNO: |
+ case SECCOMP_RET_TRACE: |
case SECCOMP_RET_ALLOW: |
break; |
case SECCOMP_RET_KILL: // We don't ever generate this |
- case SECCOMP_RET_TRACE: // We don't ever generate this |
case SECCOMP_RET_INVALID: // Should never show up in BPF program |
default: |
*err = "Unexpected return code found in BPF program"; |