summary refs log tree commit diff
path: root/seccomp/arm/input_device.policy
diff options
context:
space:
mode:
authorZach Reizner <zachr@google.com>2019-01-31 16:55:59 -0800
committerchrome-bot <chrome-bot@chromium.org>2019-02-07 03:02:12 -0800
commitbae43dd4c98182736ea601b313e03620a72ccf83 (patch)
tree8b2eab57c11705d6a6acdb606c2a5375cb8b8b9e /seccomp/arm/input_device.policy
parente403f5ccd0581ec62fbfb86de00b8c01958ffa67 (diff)
downloadcrosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.gz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.bz2
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.lz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.xz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.zst
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.zip
seccomp: refactor policy into common_device.policy
CQ-DEPEND=CL:1449895
BUG=None
TEST=vmc start termina

Change-Id: Ia3edaafc1d2958bd40e6b1adc89dd5e29b679b06
Reviewed-on: https://chromium-review.googlesource.com/1448292
Commit-Ready: Zach Reizner <zachr@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
Tested-by: Zach Reizner <zachr@chromium.org>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
Diffstat (limited to 'seccomp/arm/input_device.policy')
-rw-r--r--seccomp/arm/input_device.policy32
1 files changed, 2 insertions, 30 deletions
diff --git a/seccomp/arm/input_device.policy b/seccomp/arm/input_device.policy
index 877f80e..f26998e 100644
--- a/seccomp/arm/input_device.policy
+++ b/seccomp/arm/input_device.policy
@@ -2,36 +2,8 @@
 # Use of this source code is governed by a BSD-style license that can be
 # found in the LICENSE file.
 
-close: 1
-dup: 1
-dup2: 1
-exit_group: 1
-futex: 1
-# Disallow mmap with PROT_EXEC set.  The syntax here doesn't allow bit
-# negation, thus the manually negated mask constant.
-mmap: arg2 in 0xfffffffb
-mprotect: arg2 in 0xfffffffb
-# Allow MADV_DONTDUMP only.
-madvise: arg2 == 0x00000010
-munmap: 1
-read: 1
-recvfrom: 1
-sched_getaffinity: 1
-set_robust_list: 1
-sigaltstack: 1
-# Disallow clone's other than new threads.
-clone: arg0 & 0x00010000
-write: 1
-eventfd2: 1
-poll: 1
-ppoll: 1
-getpid: 1
-# Allow PR_SET_NAME only.
-prctl: arg0 == 15
-restart_syscall: 1
-epoll_create1: 1
-epoll_ctl: 1
-epoll_wait: 1
+@include /usr/share/policy/crosvm/common_device.policy
+
 ioctl: 1
 fcntl: 1
 getsockname: 1