| Index: sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| diff --git a/sandbox/linux/seccomp-bpf/linux_seccomp.h b/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| index 1716655f1f35e6f56c0eeecf3382a10bf67366de..50361aced15e793fb917a24c7fe1b07ec166c866 100644
|
| --- a/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| +++ b/sandbox/linux/seccomp-bpf/linux_seccomp.h
|
| @@ -91,6 +91,16 @@
|
| #define SECCOMP_MODE_FILTER 2 // User user-supplied filter
|
| #endif
|
|
|
| +#ifndef SECCOMP_SET_MODE_STRICT
|
| +#define SECCOMP_SET_MODE_STRICT 0
|
| +#endif
|
| +#ifndef SECCOMP_SET_MODE_FILTER
|
| +#define SECCOMP_SET_MODE_FILTER 1
|
| +#endif
|
| +#ifndef SECCOMP_FILTER_FLAG_TSYNC
|
| +#define SECCOMP_FILTER_FLAG_TSYNC 1
|
| +#endif
|
| +
|
| #ifndef SECCOMP_RET_KILL
|
| // Return values supported for BPF filter programs. Please note that the
|
| // "illegal" SECCOMP_RET_INVALID is not supported by the kernel, should only
|
|
|