security/sandbox/linux/linux_syscalls.h

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
michael@0 2 // Use of this source code is governed by a BSD-style license that can be
michael@0 3 // found in the LICENSE file.
michael@0 4
michael@0 5 /* This file has been imported from
michael@0 6 * http://git.chromium.org/gitweb/?p=chromium.git;a=blob_plain;f=sandbox/linux/services/linux_syscalls.h;h=77c1be8b82a0fe4aca308ca40547ebf7a008d24a;hb=2362c9abea79cae475921bdeee58f9e3910d211c
michael@0 7 */
michael@0 8
michael@0 9 // This header will be kept up to date so that we can compile system-call
michael@0 10 // policies even when system headers are old.
michael@0 11 // System call numbers are accessible through __NR_syscall_name.
michael@0 12
michael@0 13 #ifndef SANDBOX_LINUX_SERVICES_LINUX_SYSCALLS_H_
michael@0 14 #define SANDBOX_LINUX_SERVICES_LINUX_SYSCALLS_H_
michael@0 15
michael@0 16 #if defined(__x86_64__)
michael@0 17 #include "x86_64_linux_syscalls.h"
michael@0 18 #endif
michael@0 19
michael@0 20 #if defined(__i386__)
michael@0 21 #include "x86_32_linux_syscalls.h"
michael@0 22 #endif
michael@0 23
michael@0 24 #if defined(__arm__) && defined(__ARM_EABI__)
michael@0 25 #include "arm_linux_syscalls.h"
michael@0 26 #endif
michael@0 27
michael@0 28 #endif // SANDBOX_LINUX_SERVICES_LINUX_SYSCALLS_H_
michael@0 29

mercurial