diff options
author | gVisor bot <gvisor-bot@google.com> | 2020-01-30 16:12:25 -0800 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-01-30 16:12:25 -0800 |
commit | af8f6f83a32f0128abd8bbf3eb6302078e447a7b (patch) | |
tree | c15332205a316f8aa71f1d07b5d5f66a620b025d /test/syscalls/linux/seccomp.cc | |
parent | 9988cf2eeff596ce519046d80c54d09166f7d84b (diff) | |
parent | 82ae857877fdf3492f40bca87657a07892c3f59b (diff) |
Merge pull request #1471 from xiaobo55x:syscall_test
PiperOrigin-RevId: 292445329
Diffstat (limited to 'test/syscalls/linux/seccomp.cc')
-rw-r--r-- | test/syscalls/linux/seccomp.cc | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/test/syscalls/linux/seccomp.cc b/test/syscalls/linux/seccomp.cc index 294ee6808..2c947feb7 100644 --- a/test/syscalls/linux/seccomp.cc +++ b/test/syscalls/linux/seccomp.cc @@ -49,7 +49,12 @@ namespace testing { namespace { // A syscall not implemented by Linux that we don't expect to be called. +#ifdef __x86_64__ constexpr uint32_t kFilteredSyscall = SYS_vserver; +#elif __aarch64__ +// Use the last of arch_specific_syscalls which are not implemented on arm64. +constexpr uint32_t kFilteredSyscall = SYS_arch_specific_syscall + 15; +#endif // Applies a seccomp-bpf filter that returns `filtered_result` for // `sysno` and allows all other syscalls. Async-signal-safe. |