Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(47)

Side by Side Diff: sandbox/linux/services/x86_32_linux_syscalls.h

Issue 494743003: sandbox: Add support for the new seccomp() system call in kernel 3.17. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Generated from the Linux kernel's syscall_32.tbl. 5 // Generated from the Linux kernel's syscall_32.tbl.
6 #ifndef SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_ 6 #ifndef SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_
7 #define SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_ 7 #define SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_
8 8
9 #if !defined(__i386__) 9 #if !defined(__i386__)
10 #error "Including header on wrong architecture" 10 #error "Including header on wrong architecture"
(...skipping 1375 matching lines...) Expand 10 before | Expand all | Expand 10 after
1386 #define __NR_process_vm_readv 347 1386 #define __NR_process_vm_readv 347
1387 #endif 1387 #endif
1388 1388
1389 #if !defined(__NR_process_vm_writev) 1389 #if !defined(__NR_process_vm_writev)
1390 #define __NR_process_vm_writev 348 1390 #define __NR_process_vm_writev 348
1391 #endif 1391 #endif
1392 1392
1393 #if !defined(__NR_kcmp) 1393 #if !defined(__NR_kcmp)
1394 #define __NR_kcmp 349 1394 #define __NR_kcmp 349
1395 #endif 1395 #endif
1396 1396
jln (very slow on Chromium) 2014/08/20 21:34:21 Same remark: please fill or document hole.
Robert Sesek 2014/08/21 16:50:18 Done.
1397 #if !defined(__NR_seccomp)
1398 #define __NR_seccomp 354
1399 #endif
1400
1397 #endif // SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_ 1401 #endif // SANDBOX_LINUX_SERVICES_X86_32_LINUX_SYSCALLS_H_
1398 1402
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698