On Tue, Jul 28, 2015 at 4:05 AM, David Drysdale <drysdale@xxxxxxxxxx> wrote: > A while ago I was trying to build a seccomp-bpf filter program that would > survive a change of x86 architecture. This was complicated for all sorts of > reasons, but one of the problems was that the different syscall numbers aren't > all available at the same time -- hence this patch. Or just use libseccomp and let it take care of all the different ABI specific warts for you. The library handles the undefined syscalls you describe, but also multiplexed syscalls (e.g. socket related syscalls on x86) and proper invalid arch/ABI filtering (you are filtering x32 correctly on x86-64 right?). * https://github.com/seccomp/libseccomp -- paul moore www.paul-moore.com -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html