| Index: sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| diff --git a/sandbox/linux/seccomp-bpf/linux_seccomp.h b/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| index 4dd306ff042b1762971abefaa21ac46ac3fc0e1b..c13ef20bb363027b20b681d79420532e86fc2db2 100644
|
| --- a/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| +++ b/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| @@ -97,6 +97,16 @@
|
| #define SECCOMP_MODE_FILTER 2 // User user-supplied filter
|
| #endif
|
|
|
| +#ifndef SECCOMP_SET_MODE_STRICT
|
| +#define SECCOMP_SET_MODE_STRICT 0
|
| +#endif
|
| +#ifndef SECCOMP_SET_MODE_FILTER
|
| +#define SECCOMP_SET_MODE_FILTER 1
|
| +#endif
|
| +#ifndef SECCOMP_FILTER_FLAG_TSYNC
|
| +#define SECCOMP_FILTER_FLAG_TSYNC 1
|
| +#endif
|
| +
|
| #ifndef SECCOMP_RET_KILL
|
| // Return values supported for BPF filter programs. Please note that the
|
| // "illegal" SECCOMP_RET_INVALID is not supported by the kernel, should only
|
|
|