diff options
author | Stephen Barber <smbarber@chromium.org> | 2017-10-29 23:13:48 -0700 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2017-10-30 23:21:37 -0700 |
commit | ce374793bf1b40838c7588620ac5b3784fa4997a (patch) | |
tree | 71d908d9c27b9b5d1422e45647d90be1e5a3c1a6 /seccomp | |
parent | d657af628a2f0967d8a004946abde3ed34dd6dd7 (diff) | |
download | crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.gz crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.bz2 crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.lz crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.xz crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.zst crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.zip |
crosvm/devices: set thread names
crosvm spawns a lot of processes/threads, and having these all use the same name as the original process can be confusing. So at least in the instances where Rust threads are spawned (vs. minijail_fork()), use a thread::Builder to allow setting the thread name. BUG=none TEST=start crosvm, check thread names with top Change-Id: I6e55ff5fd60f258880bda8e656ab7f9da82c656e Reviewed-on: https://chromium-review.googlesource.com/742394 Commit-Ready: Stephen Barber <smbarber@chromium.org> Tested-by: Stephen Barber <smbarber@chromium.org> Reviewed-by: Stephen Barber <smbarber@chromium.org>
Diffstat (limited to 'seccomp')
-rw-r--r-- | seccomp/x86_64/block_device.policy | 2 | ||||
-rw-r--r-- | seccomp/x86_64/net_device.policy | 2 | ||||
-rw-r--r-- | seccomp/x86_64/rng_device.policy | 2 | ||||
-rw-r--r-- | seccomp/x86_64/vhost_net_device.policy | 2 | ||||
-rw-r--r-- | seccomp/x86_64/vhost_vsock_device.policy | 2 | ||||
-rw-r--r-- | seccomp/x86_64/wl_device.policy | 2 |
6 files changed, 12 insertions, 0 deletions
diff --git a/seccomp/x86_64/block_device.policy b/seccomp/x86_64/block_device.policy index 581169a..fa35ea3 100644 --- a/seccomp/x86_64/block_device.policy +++ b/seccomp/x86_64/block_device.policy @@ -24,3 +24,5 @@ write: 1 eventfd2: 1 poll: 1 getpid: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 diff --git a/seccomp/x86_64/net_device.policy b/seccomp/x86_64/net_device.policy index 23abcfe..1718f4d 100644 --- a/seccomp/x86_64/net_device.policy +++ b/seccomp/x86_64/net_device.policy @@ -23,3 +23,5 @@ sigaltstack: 1 clone: arg0 & 0x00010000 write: 1 getpid: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 diff --git a/seccomp/x86_64/rng_device.policy b/seccomp/x86_64/rng_device.policy index 429e94d..e320acf 100644 --- a/seccomp/x86_64/rng_device.policy +++ b/seccomp/x86_64/rng_device.policy @@ -23,3 +23,5 @@ write: 1 eventfd2: 1 poll: 1 getpid: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 diff --git a/seccomp/x86_64/vhost_net_device.policy b/seccomp/x86_64/vhost_net_device.policy index 6e61bba..02be1d5 100644 --- a/seccomp/x86_64/vhost_net_device.policy +++ b/seccomp/x86_64/vhost_net_device.policy @@ -40,3 +40,5 @@ sigaltstack: 1 clone: arg0 & 0x00010000 write: 1 getpid: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 diff --git a/seccomp/x86_64/vhost_vsock_device.policy b/seccomp/x86_64/vhost_vsock_device.policy index fe54042..cbbdae0 100644 --- a/seccomp/x86_64/vhost_vsock_device.policy +++ b/seccomp/x86_64/vhost_vsock_device.policy @@ -43,3 +43,5 @@ sigaltstack: 1 clone: arg0 & 0x00010000 write: 1 getpid: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 diff --git a/seccomp/x86_64/wl_device.policy b/seccomp/x86_64/wl_device.policy index 7f1ee1b..7ec8220 100644 --- a/seccomp/x86_64/wl_device.policy +++ b/seccomp/x86_64/wl_device.policy @@ -34,3 +34,5 @@ memfd_create: arg1 == 1 ftruncate: 1 # Used to determine shm size after recvmsg with fd lseek: 1 +# Allow PR_SET_NAME only. +prctl: arg0 == 15 |