virtio-devices: Add seccomp rules for vhost-user backend

The missing rules caused failures when guest powered off.

Signed-off-by: Michael Zhao <michael.zhao@arm.com>
This commit is contained in:
Michael Zhao 2020-08-26 12:57:07 +08:00 committed by Sebastien Boeuf
parent a95b6bbd8b
commit 23e5a726ec

View File

@ -290,6 +290,13 @@ fn virtio_vhost_net_thread_rules() -> Result<Vec<SyscallRuleSet>, Error> {
allow_syscall(libc::SYS_futex),
allow_syscall(libc::SYS_read),
allow_syscall(libc::SYS_write),
allow_syscall(libc::SYS_close),
allow_syscall(libc::SYS_sigaltstack),
allow_syscall(libc::SYS_munmap),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_madvise),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_exit),
])
}
@ -304,6 +311,15 @@ fn virtio_vhost_net_ctl_thread_rules() -> Result<Vec<SyscallRuleSet>, Error> {
allow_syscall(libc::SYS_epoll_wait),
allow_syscall(libc::SYS_futex),
allow_syscall(libc::SYS_read),
allow_syscall(libc::SYS_close),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_sigaltstack),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_munmap),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_madvise),
#[cfg(target_arch = "aarch64")]
allow_syscall(libc::SYS_exit),
])
}