Index: sandbox/linux/seccomp-bpf/linux_seccomp.h |
diff --git a/sandbox/linux/seccomp-bpf/linux_seccomp.h b/sandbox/linux/seccomp-bpf/linux_seccomp.h |
index 1716655f1f35e6f56c0eeecf3382a10bf67366de..50361aced15e793fb917a24c7fe1b07ec166c866 100644 |
--- a/sandbox/linux/seccomp-bpf/linux_seccomp.h |
+++ b/sandbox/linux/seccomp-bpf/linux_seccomp.h |
@@ -91,6 +91,16 @@ |
#define SECCOMP_MODE_FILTER 2 // User user-supplied filter |
#endif |
+#ifndef SECCOMP_SET_MODE_STRICT |
+#define SECCOMP_SET_MODE_STRICT 0 |
+#endif |
+#ifndef SECCOMP_SET_MODE_FILTER |
+#define SECCOMP_SET_MODE_FILTER 1 |
+#endif |
+#ifndef SECCOMP_FILTER_FLAG_TSYNC |
+#define SECCOMP_FILTER_FLAG_TSYNC 1 |
+#endif |
+ |
#ifndef SECCOMP_RET_KILL |
// Return values supported for BPF filter programs. Please note that the |
// "illegal" SECCOMP_RET_INVALID is not supported by the kernel, should only |