| Index: sandbox/linux/bpf_dsl/bpf_dsl.h
|
| diff --git a/sandbox/linux/bpf_dsl/bpf_dsl.h b/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| index cfa4add013178321721a125b6eb6e52de7caf43b..7bb691305ebcaba0885f3a0da3d5b361069fcacd 100644
|
| --- a/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| +++ b/sandbox/linux/bpf_dsl/bpf_dsl.h
|
| @@ -43,8 +43,8 @@ class SandboxBPF;
|
| // if (sysno == __NR_fcntl) {
|
| // Arg<int> fd(0), cmd(1);
|
| // Arg<unsigned long> flags(2);
|
| -// const unsigned long kBadFlags = ~(O_ACCMODE | O_NONBLOCK);
|
| -// return If(fd == 0 && cmd == F_SETFL && (flags & kBadFlags) == 0,
|
| +// const uint64_t kGoodFlags = O_ACCMODE | O_NONBLOCK;
|
| +// return If(fd == 0 && cmd == F_SETFL && (flags & ~kGoodFlags) == 0,
|
| // Allow())
|
| // .ElseIf(cmd == F_DUPFD || cmd == F_DUPFD_CLOEXEC,
|
| // Error(EMFILE))
|
|
|