summary refs log tree commit diff
path: root/seccomp/arm/vhost_net_device.policy
diff options
context:
space:
mode:
authorZach Reizner <zachr@google.com>2019-01-31 16:55:59 -0800
committerchrome-bot <chrome-bot@chromium.org>2019-02-07 03:02:12 -0800
commitbae43dd4c98182736ea601b313e03620a72ccf83 (patch)
tree8b2eab57c11705d6a6acdb606c2a5375cb8b8b9e /seccomp/arm/vhost_net_device.policy
parente403f5ccd0581ec62fbfb86de00b8c01958ffa67 (diff)
downloadcrosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.gz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.bz2
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.lz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.xz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.zst
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.zip
seccomp: refactor policy into common_device.policy
CQ-DEPEND=CL:1449895
BUG=None
TEST=vmc start termina

Change-Id: Ia3edaafc1d2958bd40e6b1adc89dd5e29b679b06
Reviewed-on: https://chromium-review.googlesource.com/1448292
Commit-Ready: Zach Reizner <zachr@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
Tested-by: Zach Reizner <zachr@chromium.org>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
Diffstat (limited to 'seccomp/arm/vhost_net_device.policy')
-rw-r--r--seccomp/arm/vhost_net_device.policy31
1 files changed, 2 insertions, 29 deletions
diff --git a/seccomp/arm/vhost_net_device.policy b/seccomp/arm/vhost_net_device.policy
index 815aa34..58fc7ef 100644
--- a/seccomp/arm/vhost_net_device.policy
+++ b/seccomp/arm/vhost_net_device.policy
@@ -2,12 +2,8 @@
 # Use of this source code is governed by a BSD-style license that can be
 # found in the LICENSE file.
 
-close: 1
-dup: 1
-dup2: 1
-exit_group: 1
-futex: 1
-gettimeofday: 1
+@include /usr/share/policy/crosvm/common_device.policy
+
 # Whitelist vhost_net ioctls only.
 # arg1 == VHOST_GET_FEATURES ||
 # arg1 == VHOST_SET_FEATURES ||
@@ -25,26 +21,3 @@ gettimeofday: 1
 # arg1 == VHOST_SET_VRING_ERR ||
 # arg1 == VHOST_NET_SET_BACKEND
 ioctl: arg1 == 0x8008af00 || arg1 == 0x4008af00 || arg1 == 0x0000af01 || arg1 == 0x0000af02 || arg1 == 0x4008af03 || arg1 == 0x4008af04 || arg1 == 0x4004af07 || arg1 == 0x4008af10 || arg1 == 0x4028af11 || arg1 == 0x4008af12 || arg1 == 0xc008af12 || arg1 == 0x4008af20 || arg1 == 0x4008af21 || arg1 == 0x4008af22 || arg1 == 0x4008af30
-# Disallow mmap with PROT_EXEC set.  The syntax here doesn't allow bit
-# negation, thus the manually negated mask constant.
-mmap2: arg2 in 0xfffffffb
-mprotect: arg2 in 0xfffffffb
-munmap: 1
-poll: 1
-ppoll: 1
-read: 1
-recv: 1
-sched_getaffinity: 1
-set_robust_list: 1
-sigaltstack: 1
-# Disallow clone's other than new threads.
-# arg0 is flags. Because kernel.
-clone: arg0 & 0x00010000
-write: 1
-getpid: 1
-# Allow PR_SET_NAME only.
-prctl: arg0 == 15
-restart_syscall: 1
-epoll_create1: 1
-epoll_ctl: 1
-epoll_wait: 1