summary refs log tree commit diff
path: root/seccomp
diff options
context:
space:
mode:
authorStephen Barber <smbarber@chromium.org>2017-10-29 23:13:48 -0700
committerchrome-bot <chrome-bot@chromium.org>2017-10-30 23:21:37 -0700
commitce374793bf1b40838c7588620ac5b3784fa4997a (patch)
tree71d908d9c27b9b5d1422e45647d90be1e5a3c1a6 /seccomp
parentd657af628a2f0967d8a004946abde3ed34dd6dd7 (diff)
downloadcrosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.gz
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.bz2
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.lz
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.xz
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.tar.zst
crosvm-ce374793bf1b40838c7588620ac5b3784fa4997a.zip
crosvm/devices: set thread names
crosvm spawns a lot of processes/threads, and having these all use the same
name as the original process can be confusing. So at least in the instances
where Rust threads are spawned (vs. minijail_fork()), use a thread::Builder
to allow setting the thread name.

BUG=none
TEST=start crosvm, check thread names with top

Change-Id: I6e55ff5fd60f258880bda8e656ab7f9da82c656e
Reviewed-on: https://chromium-review.googlesource.com/742394
Commit-Ready: Stephen Barber <smbarber@chromium.org>
Tested-by: Stephen Barber <smbarber@chromium.org>
Reviewed-by: Stephen Barber <smbarber@chromium.org>
Diffstat (limited to 'seccomp')
-rw-r--r--seccomp/x86_64/block_device.policy2
-rw-r--r--seccomp/x86_64/net_device.policy2
-rw-r--r--seccomp/x86_64/rng_device.policy2
-rw-r--r--seccomp/x86_64/vhost_net_device.policy2
-rw-r--r--seccomp/x86_64/vhost_vsock_device.policy2
-rw-r--r--seccomp/x86_64/wl_device.policy2
6 files changed, 12 insertions, 0 deletions
diff --git a/seccomp/x86_64/block_device.policy b/seccomp/x86_64/block_device.policy
index 581169a..fa35ea3 100644
--- a/seccomp/x86_64/block_device.policy
+++ b/seccomp/x86_64/block_device.policy
@@ -24,3 +24,5 @@ write: 1
 eventfd2: 1
 poll: 1
 getpid: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15
diff --git a/seccomp/x86_64/net_device.policy b/seccomp/x86_64/net_device.policy
index 23abcfe..1718f4d 100644
--- a/seccomp/x86_64/net_device.policy
+++ b/seccomp/x86_64/net_device.policy
@@ -23,3 +23,5 @@ sigaltstack: 1
 clone: arg0 & 0x00010000
 write: 1
 getpid: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15
diff --git a/seccomp/x86_64/rng_device.policy b/seccomp/x86_64/rng_device.policy
index 429e94d..e320acf 100644
--- a/seccomp/x86_64/rng_device.policy
+++ b/seccomp/x86_64/rng_device.policy
@@ -23,3 +23,5 @@ write: 1
 eventfd2: 1
 poll: 1
 getpid: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15
diff --git a/seccomp/x86_64/vhost_net_device.policy b/seccomp/x86_64/vhost_net_device.policy
index 6e61bba..02be1d5 100644
--- a/seccomp/x86_64/vhost_net_device.policy
+++ b/seccomp/x86_64/vhost_net_device.policy
@@ -40,3 +40,5 @@ sigaltstack: 1
 clone: arg0 & 0x00010000
 write: 1
 getpid: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15
diff --git a/seccomp/x86_64/vhost_vsock_device.policy b/seccomp/x86_64/vhost_vsock_device.policy
index fe54042..cbbdae0 100644
--- a/seccomp/x86_64/vhost_vsock_device.policy
+++ b/seccomp/x86_64/vhost_vsock_device.policy
@@ -43,3 +43,5 @@ sigaltstack: 1
 clone: arg0 & 0x00010000
 write: 1
 getpid: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15
diff --git a/seccomp/x86_64/wl_device.policy b/seccomp/x86_64/wl_device.policy
index 7f1ee1b..7ec8220 100644
--- a/seccomp/x86_64/wl_device.policy
+++ b/seccomp/x86_64/wl_device.policy
@@ -34,3 +34,5 @@ memfd_create: arg1 == 1
 ftruncate: 1
 # Used to determine shm size after recvmsg with fd
 lseek: 1
+# Allow PR_SET_NAME only.
+prctl: arg0 == 15