summary refs log tree commit diff
path: root/seccomp/x86_64/common_device.policy
diff options
context:
space:
mode:
authorZach Reizner <zachr@google.com>2019-01-31 16:55:59 -0800
committerchrome-bot <chrome-bot@chromium.org>2019-02-07 03:02:12 -0800
commitbae43dd4c98182736ea601b313e03620a72ccf83 (patch)
tree8b2eab57c11705d6a6acdb606c2a5375cb8b8b9e /seccomp/x86_64/common_device.policy
parente403f5ccd0581ec62fbfb86de00b8c01958ffa67 (diff)
downloadcrosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.gz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.bz2
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.lz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.xz
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.tar.zst
crosvm-bae43dd4c98182736ea601b313e03620a72ccf83.zip
seccomp: refactor policy into common_device.policy
CQ-DEPEND=CL:1449895
BUG=None
TEST=vmc start termina

Change-Id: Ia3edaafc1d2958bd40e6b1adc89dd5e29b679b06
Reviewed-on: https://chromium-review.googlesource.com/1448292
Commit-Ready: Zach Reizner <zachr@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
Tested-by: Zach Reizner <zachr@chromium.org>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
Diffstat (limited to 'seccomp/x86_64/common_device.policy')
-rw-r--r--seccomp/x86_64/common_device.policy41
1 files changed, 41 insertions, 0 deletions
diff --git a/seccomp/x86_64/common_device.policy b/seccomp/x86_64/common_device.policy
new file mode 100644
index 0000000..7fa6e52
--- /dev/null
+++ b/seccomp/x86_64/common_device.policy
@@ -0,0 +1,41 @@
+# Copyright 2019 The Chromium OS Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+brk: 1
+clone: arg0 & CLONE_THREAD
+close: 1
+dup2: 1
+dup: 1
+epoll_create1: 1
+epoll_ctl: 1
+epoll_wait: 1
+eventfd2: 1
+exit: 1
+exit_group: 1
+futex: 1
+getpid: 1
+gettimeofday: 1
+kill: 1
+madvise: arg2 == MADV_DONTNEED || arg2 == MADV_DONTDUMP || arg2 == MADV_REMOVE
+mmap: arg2 in ~PROT_EXEC
+mprotect: arg2 in ~PROT_EXEC
+mremap: 1
+munmap: 1
+nanosleep: 1
+open: return ENOENT
+openat: return ENOENT
+pipe2: 1
+poll: 1
+ppoll: 1
+prctl: arg0 == PR_SET_NAME
+read: 1
+recvfrom: 1
+restart_syscall: 1
+rt_sigaction: 1
+rt_sigprocmask: 1
+rt_sigreturn: 1
+sched_getaffinity: 1
+set_robust_list: 1
+sigaltstack: 1
+write: 1