summaryrefslogtreecommitdiffstats
path: root/qemu-seccomp.c
diff options
context:
space:
mode:
authorPaul Moore2013-05-29 22:30:01 +0200
committerAnthony Liguori2013-05-30 18:46:07 +0200
commitfd21faadb12669e24eaf0a277de61c24fcde4cac (patch)
tree3ffe0876def01e3ee66b5fdf69d3808f4adf4e94 /qemu-seccomp.c
parentgdbstub: do not restart crashed guest (diff)
downloadqemu-fd21faadb12669e24eaf0a277de61c24fcde4cac.tar.gz
qemu-fd21faadb12669e24eaf0a277de61c24fcde4cac.tar.xz
qemu-fd21faadb12669e24eaf0a277de61c24fcde4cac.zip
seccomp: add the asynchronous I/O syscalls to the whitelist
In order to enable the asynchronous I/O functionality when using the seccomp sandbox we need to add the associated syscalls to the whitelist. Signed-off-by: Paul Moore <pmoore@redhat.com> Reviewed-by: Corey Bryant <coreyb@linux.vnet.ibm.com> Message-id: 20130529203001.20939.83322.stgit@localhost Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
Diffstat (limited to 'qemu-seccomp.c')
-rw-r--r--qemu-seccomp.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/qemu-seccomp.c b/qemu-seccomp.c
index 031da1dfee..ca123bfeba 100644
--- a/qemu-seccomp.c
+++ b/qemu-seccomp.c
@@ -87,6 +87,7 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(stat), 245 },
{ SCMP_SYS(uname), 245 },
{ SCMP_SYS(eventfd2), 245 },
+ { SCMP_SYS(io_getevents), 245 },
{ SCMP_SYS(dup), 245 },
{ SCMP_SYS(dup2), 245 },
{ SCMP_SYS(dup3), 245 },
@@ -229,7 +230,9 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(sendmmsg), 241 },
{ SCMP_SYS(recvmmsg), 241 },
{ SCMP_SYS(prlimit64), 241 },
- { SCMP_SYS(waitid), 241 }
+ { SCMP_SYS(waitid), 241 },
+ { SCMP_SYS(io_setup), 241 },
+ { SCMP_SYS(io_destroy), 241 }
};
int seccomp_start(void)