Index: sandbox/linux/seccomp-bpf/linux_seccomp.h |
diff --git a/sandbox/linux/seccomp-bpf/linux_seccomp.h b/sandbox/linux/seccomp-bpf/linux_seccomp.h |
index 4dd306ff042b1762971abefaa21ac46ac3fc0e1b..c13ef20bb363027b20b681d79420532e86fc2db2 100644 |
--- a/sandbox/linux/seccomp-bpf/linux_seccomp.h |
+++ b/sandbox/linux/seccomp-bpf/linux_seccomp.h |
@@ -97,6 +97,16 @@ |
#define SECCOMP_MODE_FILTER 2 // User user-supplied filter |
#endif |
+#ifndef SECCOMP_SET_MODE_STRICT |
+#define SECCOMP_SET_MODE_STRICT 0 |
+#endif |
+#ifndef SECCOMP_SET_MODE_FILTER |
+#define SECCOMP_SET_MODE_FILTER 1 |
+#endif |
+#ifndef SECCOMP_FILTER_FLAG_TSYNC |
+#define SECCOMP_FILTER_FLAG_TSYNC 1 |
+#endif |
+ |
#ifndef SECCOMP_RET_KILL |
// Return values supported for BPF filter programs. Please note that the |
// "illegal" SECCOMP_RET_INVALID is not supported by the kernel, should only |