crosvm/seccomp/arm
Jorge E. Moreira e40fb21c0d Allow sched_yield in all devices' seccomp policy
The sched_yield system call is somehow called by the code the rust
compiler generates and not directly by the author's implementation. That
along with the fact that it won't get called on every run makes it very
easy to miss when adding a new device (that happened with virtio-snd).
Since that call is quite harmless (it could be argued minijail shouldn't
even block it in the first place) it makes sense to allow it for all
devices.

BUG=b/201306350

Change-Id: I9895da6c8060ae83053474ed9e4472ea2cd8d3e3
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/3248126
Auto-Submit: Jorge Moreira Broche <jemoreira@google.com>
Tested-by: kokoro <noreply+kokoro@google.com>
Commit-Queue: Jorge Moreira Broche <jemoreira@google.com>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
2021-10-28 19:10:45 +00:00
..
9p_device.policy seccomp: Add fstatfs (32bit) to arm policies 2021-08-18 15:17:55 +00:00
balloon_device.policy
battery.policy
block_device.policy seccomp: allow fstatat64/statx syscalls on arm 2021-08-26 20:59:21 +00:00
common_device.policy Allow sched_yield in all devices' seccomp policy 2021-10-28 19:10:45 +00:00
cras_audio_device.policy ac97: Add timerfd operations to accepted list 2021-07-23 18:43:21 +00:00
cras_snd_device.policy seccomp: Add timerfd_* to cras_snd_device.policy 2021-10-11 05:10:11 +00:00
fs_device.policy fs: Support fs-verity 2021-08-23 16:15:03 +00:00
gpu_device.policy Allow sched_yield in all devices' seccomp policy 2021-10-28 19:10:45 +00:00
input_device.policy
net_device.policy
null_audio_device.policy
pmem_device.policy
rng_device.policy
serial.policy
tpm_device.policy
vhost_net_device.policy
vhost_vsock_device.policy
video_device.policy Allow sched_yield in all devices' seccomp policy 2021-10-28 19:10:45 +00:00
vios_audio_device.policy
wl_device.policy
xhci.policy seccomp: make consistent use of faccessat/2 2021-08-24 23:12:34 +00:00