@@ -46,23 +46,23 @@ diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc ./sandbox/linux/s
4646index d9d1882..0567557 100644
4747--- a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
4848+++ ./sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
49- @@ -392 ,6 +392 ,7 @@ bool SyscallSets::IsAllowedProcessStartOrDeath(int sysno) {
49+ @@ -438 ,6 +438 ,7 @@
5050 #if defined(__i386__)
5151 case __NR_waitpid:
5252 #endif
5353+ case __NR_set_tid_address:
5454 return true;
5555 case __NR_clone: // Should be parameter-restricted.
5656 case __NR_setns: // Privileged.
57- @@ -404 ,7 +405 ,6 @@ bool SyscallSets::IsAllowedProcessStartOrDeath(int sysno) {
57+ @@ -450 ,7 +451 ,6 @@
5858 #if defined(__i386__) || defined(__x86_64__) || defined(__mips__)
5959 case __NR_set_thread_area:
6060 #endif
6161- case __NR_set_tid_address:
6262 case __NR_unshare:
6363 #if !defined(__mips__) && !defined(__aarch64__)
6464 case __NR_vfork:
65- @@ -514 ,6 +514 ,8 @@ bool SyscallSets::IsAllowedAddressSpaceAccess(int sysno) {
65+ @@ -549 ,6 +549 ,8 @@
6666 case __NR_munlock:
6767 case __NR_munmap:
6868 case __NR_mseal:
@@ -71,7 +71,7 @@ index d9d1882..0567557 100644
7171 return true;
7272 case __NR_madvise:
7373 case __NR_mincore:
74- @@ -531 ,7 +533 ,6 @@ bool SyscallSets::IsAllowedAddressSpaceAccess(int sysno) {
74+ @@ -566 ,7 +568 ,6 @@
7575 case __NR_modify_ldt:
7676 #endif
7777 case __NR_mprotect:
@@ -93,8 +93,11 @@ index 2b78a0c..b6fedb5 100644
9393 #include "sandbox/linux/system_headers/x86_64_linux_syscalls.h"
9494--- a/sandbox/policy/linux/bpf_renderer_policy_linux.cc
9595+++ b/sandbox/policy/linux/bpf_renderer_policy_linux.cc
96- @@ -94,6 +94,9 @@
96+ @@ -106,8 +106,12 @@
97+ #endif
98+ case __NR_mremap: // See crbug.com/149834.
9799 case __NR_pwrite64:
100+ + case __NR_pwritev2:
98101 case __NR_sched_get_priority_max:
99102 case __NR_sched_get_priority_min:
100103+ case __NR_sched_getparam:
0 commit comments