summaryrefslogtreecommitdiffhomepage
path: root/test/syscalls/linux/seccomp.cc
diff options
context:
space:
mode:
authorgVisor bot <gvisor-bot@google.com>2020-01-30 16:12:25 -0800
committergVisor bot <gvisor-bot@google.com>2020-01-30 16:12:25 -0800
commitaf8f6f83a32f0128abd8bbf3eb6302078e447a7b (patch)
treec15332205a316f8aa71f1d07b5d5f66a620b025d /test/syscalls/linux/seccomp.cc
parent9988cf2eeff596ce519046d80c54d09166f7d84b (diff)
parent82ae857877fdf3492f40bca87657a07892c3f59b (diff)
Merge pull request #1471 from xiaobo55x:syscall_test
PiperOrigin-RevId: 292445329
Diffstat (limited to 'test/syscalls/linux/seccomp.cc')
-rw-r--r--test/syscalls/linux/seccomp.cc5
1 files changed, 5 insertions, 0 deletions
diff --git a/test/syscalls/linux/seccomp.cc b/test/syscalls/linux/seccomp.cc
index 294ee6808..2c947feb7 100644
--- a/test/syscalls/linux/seccomp.cc
+++ b/test/syscalls/linux/seccomp.cc
@@ -49,7 +49,12 @@ namespace testing {
namespace {
// A syscall not implemented by Linux that we don't expect to be called.
+#ifdef __x86_64__
constexpr uint32_t kFilteredSyscall = SYS_vserver;
+#elif __aarch64__
+// Use the last of arch_specific_syscalls which are not implemented on arm64.
+constexpr uint32_t kFilteredSyscall = SYS_arch_specific_syscall + 15;
+#endif
// Applies a seccomp-bpf filter that returns `filtered_result` for
// `sysno` and allows all other syscalls. Async-signal-safe.