crosvm/seccomp/aarch64
Jorge E. Moreira e40fb21c0d Allow sched_yield in all devices' seccomp policy
The sched_yield system call is somehow called by the code the rust
compiler generates and not directly by the author's implementation. That
along with the fact that it won't get called on every run makes it very
easy to miss when adding a new device (that happened with virtio-snd).
Since that call is quite harmless (it could be argued minijail shouldn't
even block it in the first place) it makes sense to allow it for all
devices.

BUG=b/201306350

Change-Id: I9895da6c8060ae83053474ed9e4472ea2cd8d3e3
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/3248126
Auto-Submit: Jorge Moreira Broche <jemoreira@google.com>
Tested-by: kokoro <noreply+kokoro@google.com>
Commit-Queue: Jorge Moreira Broche <jemoreira@google.com>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
2021-10-28 19:10:45 +00:00
..
9p_device.policy
balloon_device.policy
battery.policy
block_device.policy seccomp: allow newfstatat in more amd64/arm64 policies 2021-10-01 17:09:16 +00:00
common_device.policy Allow sched_yield in all devices' seccomp policy 2021-10-28 19:10:45 +00:00
cras_audio_device.policy
cras_snd_device.policy seccomp: Add timerfd_* to cras_snd_device.policy 2021-10-11 05:10:11 +00:00
fs_device.policy
gpu_device.policy
input_device.policy
net_device.policy
null_audio_device.policy
pmem_device.policy
rng_device.policy
serial.policy
tpm_device.policy seccomp: allow newfstatat in more amd64/arm64 policies 2021-10-01 17:09:16 +00:00
vhost_net_device.policy
vhost_vsock_device.policy
vios_audio_device.policy
wl_device.policy
xhci.policy seccomp: allow newfstatat in more amd64/arm64 policies 2021-10-01 17:09:16 +00:00