seccomp: add the asynchronous I/O syscalls to the whitelist
In order to enable the asynchronous I/O functionality when using the seccomp sandbox we need to add the associated syscalls to the whitelist. Signed-off-by: Paul Moore <pmoore@redhat.com> Reviewed-by: Corey Bryant <coreyb@linux.vnet.ibm.com> Message-id: 20130529203001.20939.83322.stgit@localhost Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
This commit is contained in:
		
							parent
							
								
									87f25c12bf
								
							
						
					
					
						commit
						fd21faadb1
					
				| 
						 | 
				
			
			@ -87,6 +87,7 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
 | 
			
		|||
    { SCMP_SYS(stat), 245 },
 | 
			
		||||
    { SCMP_SYS(uname), 245 },
 | 
			
		||||
    { SCMP_SYS(eventfd2), 245 },
 | 
			
		||||
    { SCMP_SYS(io_getevents), 245 },
 | 
			
		||||
    { SCMP_SYS(dup), 245 },
 | 
			
		||||
    { SCMP_SYS(dup2), 245 },
 | 
			
		||||
    { SCMP_SYS(dup3), 245 },
 | 
			
		||||
| 
						 | 
				
			
			@ -229,7 +230,9 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
 | 
			
		|||
    { SCMP_SYS(sendmmsg), 241 },
 | 
			
		||||
    { SCMP_SYS(recvmmsg), 241 },
 | 
			
		||||
    { SCMP_SYS(prlimit64), 241 },
 | 
			
		||||
    { SCMP_SYS(waitid), 241 }
 | 
			
		||||
    { SCMP_SYS(waitid), 241 },
 | 
			
		||||
    { SCMP_SYS(io_setup), 241 },
 | 
			
		||||
    { SCMP_SYS(io_destroy), 241 }
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
int seccomp_start(void)
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue