| Index: sandbox/linux/seccomp-bpf/verifier.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/verifier.cc b/sandbox/linux/seccomp-bpf/verifier.cc
|
| index 1292504decc012e9cfbc6c3e6eca39cc440b8cf6..0d422012e1aaf91bd04d4d55b1c0d030b1064766 100644
|
| --- a/sandbox/linux/seccomp-bpf/verifier.cc
|
| +++ b/sandbox/linux/seccomp-bpf/verifier.cc
|
| @@ -421,10 +421,10 @@ uint32_t Verifier::EvaluateBPF(const std::vector<struct sock_filter>& program,
|
| switch (r & SECCOMP_RET_ACTION) {
|
| case SECCOMP_RET_TRAP:
|
| case SECCOMP_RET_ERRNO:
|
| + case SECCOMP_RET_TRACE:
|
| case SECCOMP_RET_ALLOW:
|
| break;
|
| case SECCOMP_RET_KILL: // We don't ever generate this
|
| - case SECCOMP_RET_TRACE: // We don't ever generate this
|
| case SECCOMP_RET_INVALID: // Should never show up in BPF program
|
| default:
|
| *err = "Unexpected return code found in BPF program";
|
|
|