mirror of
https://codeberg.org/kiss-community/repo
synced 2024-11-16 03:30:23 -07:00
55 lines
1.6 KiB
Diff
55 lines
1.6 KiB
Diff
allow usage of SYS_membarrier, needed since musl-1.1.22
|
|
|
|
Taken from voidlinux: https://github.com/void-linux/void-packages/commit/4198411ac3b9e2620e171c662df82008da0faebb
|
|
|
|
--- a/security/sandbox/linux/SandboxFilter.cpp
|
|
+++ b/security/sandbox/linux/SandboxFilter.cpp
|
|
@@ -572,6 +572,8 @@
|
|
case __NR_set_tid_address:
|
|
return Allow();
|
|
#endif
|
|
+ case __NR_membarrier:
|
|
+ return Allow();
|
|
|
|
// prctl
|
|
case __NR_prctl: {
|
|
|
|
--- a/security/sandbox/chromium/sandbox/linux/system_headers/arm_linux_syscalls.h
|
|
+++ b/security/sandbox/chromium/sandbox/linux/system_headers/arm_linux_syscalls.h
|
|
@@ -1385,6 +1385,10 @@
|
|
#define __NR_memfd_create (__NR_SYSCALL_BASE+385)
|
|
#endif
|
|
|
|
+#if !defined(__NR_membarrier)
|
|
+#define __NR_membarrier (__NR_SYSCALL_BASE+389)
|
|
+#endif
|
|
+
|
|
// ARM private syscalls.
|
|
#if !defined(__ARM_NR_BASE)
|
|
#define __ARM_NR_BASE (__NR_SYSCALL_BASE + 0xF0000)
|
|
|
|
--- a/security/sandbox/chromium/sandbox/linux/system_headers/x86_64_linux_syscalls.h
|
|
+++ b/security/sandbox/chromium/sandbox/linux/system_headers/x86_64_linux_syscalls.h
|
|
@@ -1290,5 +1290,9 @@
|
|
#define __NR_memfd_create 319
|
|
#endif
|
|
|
|
+#if !defined(__NR_membarrier)
|
|
+#define __NR_membarrier 324
|
|
+#endif
|
|
+
|
|
#endif // SANDBOX_LINUX_SYSTEM_HEADERS_X86_64_LINUX_SYSCALLS_H_
|
|
|
|
--- a/security/sandbox/chromium/sandbox/linux/system_headers/x86_32_linux_syscalls.h
|
|
+++ b/security/sandbox/chromium/sandbox/linux/system_headers/x86_32_linux_syscalls.h
|
|
@@ -1490,5 +1490,9 @@
|
|
#define __NR_shutdown 373
|
|
#endif
|
|
|
|
+#if !defined(__NR_membarrier)
|
|
+#define __NR_membarrier 375
|
|
+#endif
|
|
+
|
|
#endif // SANDBOX_LINUX_SYSTEM_HEADERS_X86_32_LINUX_SYSCALLS_H_
|
|
|