mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-02-06 02:25:23 +00:00
c553d1c283
We are going to use separate policy files per device for the following scenarios: 1) Regular in-VMM virtio device, 2) Virtio device over vhost-user, 3) Virtio device over Vvu. Each of these scenarios require slightly different policies as a jailed device process needs to allow not only the system calls necessary for the device to function, but also those required by the virtio transport in use. This CL adds a README.md file to the seccomp directory that details the naming and policy inclusion rules, and updates the serial, xhci and coiommu policies to follow the naming scheme. Vhost-user and VVU policy files will be added along with support for jailing devices when they are in use. BUG=b:217480043 TEST=serial device works with `crosvm run`. Change-Id: I6d454aa6e05d00691fe3346e822ed1fc7b24aed8 Signed-off-by: Alexandre Courbot <acourbot@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/3706490 Reviewed-by: Daniel Verkamp <dverkamp@chromium.org> Tested-by: kokoro <noreply+kokoro@google.com>
44 lines
1.3 KiB
Text
44 lines
1.3 KiB
Text
# Copyright 2018 The Chromium OS Authors. All rights reserved.
|
|
# Use of this source code is governed by a BSD-style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
@include /usr/share/policy/crosvm/common_device.policy
|
|
|
|
lstat: 1
|
|
timerfd_create: 1
|
|
name_to_handle_at: 1
|
|
access: 1
|
|
faccessat: 1
|
|
faccessat2: 1
|
|
getsockname: 1
|
|
pipe: 1
|
|
setsockopt: 1
|
|
bind: 1
|
|
open: return ENOENT
|
|
openat: 1
|
|
socket: arg0 == AF_NETLINK
|
|
stat: 1
|
|
statx: 1
|
|
# The following ioctls are:
|
|
# 0x4008550d == USBDEVFS_REAPURBNDELAY
|
|
# 0x41045508 == USBDEVFS_GETDRIVER
|
|
# 0x550b == USBDEVFS_DISCARDURB
|
|
# 0x8004550f == USBDEVFS_CLAIMINTERFACE
|
|
# 0x80045510 == USBDEVFS_RELEASEINTERFACE
|
|
# 0x80045515 == USBDEVFS_CLEAR_HALT
|
|
# 0x8004551a == USBDEVFS_GET_CAPABILITIES
|
|
# 0x8038550a == USBDEVFS_SUBMITURB
|
|
# 0xc0185500 == USBDEVFS_CONTROL
|
|
# 0x5514 == USBDEVFS_RESET
|
|
# 0x80045505 == USBDEVFS_SETCONFIGURATION
|
|
# 0x8108551b == USBDEVFS_DISCONNECT_CLAIM
|
|
# 0x40085511 == USBDEVFS_CONNECTINFO
|
|
# 0x80185520 == USBDEVFS_CONNINFO_EX
|
|
ioctl: arg1 == 0xc0185500 || arg1 == 0x41045508 || arg1 == 0x8004550f || arg1 == 0x4008550d || arg1 == 0x8004551a || arg1 == 0x550b || arg1 == 0x80045510 || arg1 == 0x80045515 || arg1 == 0x8038550a || arg1 == 0x5514 || arg1 == 0x80045505 || arg1 == 0x8108551b || arg1 == 0x40085511 || arg1 == 0x80185520
|
|
fstat: 1
|
|
newfstatat: 1
|
|
getrandom: 1
|
|
getdents: 1
|
|
getdents64: 1
|
|
lseek: 1
|
|
prctl: arg0 == PR_SET_NAME
|