diff options
author | Dean Deng <deandeng@google.com> | 2019-10-23 22:21:33 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2019-10-23 22:23:05 -0700 |
commit | 7ca50236c42ad1b1aa19951815d03b62c0c722ed (patch) | |
tree | 586fa422b8447eb441e58deb521c74884dad9a6d /pkg/sentry/syscalls/linux/linux64_amd64.go | |
parent | 072af49059a1818e0e06188be81fe425363acf55 (diff) |
Handle AT_EMPTY_PATH flag in execveat.
PiperOrigin-RevId: 276419967
Diffstat (limited to 'pkg/sentry/syscalls/linux/linux64_amd64.go')
-rw-r--r-- | pkg/sentry/syscalls/linux/linux64_amd64.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/sentry/syscalls/linux/linux64_amd64.go b/pkg/sentry/syscalls/linux/linux64_amd64.go index aedb6d774..6d3801ad9 100644 --- a/pkg/sentry/syscalls/linux/linux64_amd64.go +++ b/pkg/sentry/syscalls/linux/linux64_amd64.go @@ -362,7 +362,7 @@ var AMD64 = &kernel.SyscallTable{ 319: syscalls.Supported("memfd_create", MemfdCreate), 320: syscalls.CapError("kexec_file_load", linux.CAP_SYS_BOOT, "", nil), 321: syscalls.CapError("bpf", linux.CAP_SYS_ADMIN, "", nil), - 322: syscalls.PartiallySupported("execveat", Execveat, "No support for AT_EMPTY_PATH, AT_SYMLINK_FOLLOW.", nil), + 322: syscalls.PartiallySupported("execveat", Execveat, "No support for AT_SYMLINK_FOLLOW.", nil), 323: syscalls.ErrorWithEvent("userfaultfd", syserror.ENOSYS, "", []string{"gvisor.dev/issue/266"}), // TODO(b/118906345) 324: syscalls.ErrorWithEvent("membarrier", syserror.ENOSYS, "", []string{"gvisor.dev/issue/267"}), // TODO(b/118904897) 325: syscalls.PartiallySupported("mlock2", Mlock2, "Stub implementation. The sandbox lacks appropriate permissions.", nil), |