| # Copyright 2019 The ChromiumOS Authors |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| # Copyright 2019 The ChromiumOS Authors |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| |
| # This is an allow list of syscalls for most of crosvm devices. |
| # |
| # Note that some device policy files don't depend on this policy file |
| # because of some conflicts such as gpu_common.policy. |
| # If you want to modify policies for all the devices, please modify |
| # not only this file but also other *_common.policy files. |
| |
| brk: 1 |
| clock_gettime: 1 |
| # ANDROID: modified to 1 because of duplicate error with jail_warden |
| clone: 1 |
| clone3: 1 |
| close: 1 |
| dup2: 1 |
| dup: 1 |
| epoll_create1: 1 |
| epoll_ctl: 1 |
| epoll_pwait: 1 |
| epoll_wait: 1 |
| eventfd2: 1 |
| exit: 1 |
| exit_group: 1 |
| ftruncate: 1 |
| futex: 1 |
| getcwd: 1 |
| getpid: 1 |
| gettid: 1 |
| gettimeofday: 1 |
| io_uring_setup: 1 |
| io_uring_register: 1 |
| io_uring_enter: 1 |
| kill: 1 |
| lseek: 1 |
| # ANDROID: modified to 1 because of duplicate error with jail_warden |
| madvise: 1 |
| membarrier: 1 |
| memfd_create: 1 |
| # ANDROID: added PROT_WRITE because of duplicate error with jail_warden |
| mmap: arg2 in ~PROT_EXEC || arg2 in ~PROT_WRITE |
| # ANDROID: added PROT_WRITE because of duplicate error with jail_warden |
| mprotect: arg2 in ~PROT_EXEC || arg2 in ~PROT_WRITE |
| mremap: 1 |
| munmap: 1 |
| nanosleep: 1 |
| clock_nanosleep: 1 |
| pipe2: 1 |
| poll: 1 |
| ppoll: 1 |
| read: 1 |
| readlink: 1 |
| readlinkat: 1 |
| readv: 1 |
| recvfrom: 1 |
| recvmsg: 1 |
| restart_syscall: 1 |
| rseq: 1 |
| rt_sigaction: 1 |
| rt_sigprocmask: 1 |
| rt_sigreturn: 1 |
| sched_getaffinity: 1 |
| sched_yield: 1 |
| sendmsg: 1 |
| sendto: 1 |
| set_robust_list: 1 |
| sigaltstack: 1 |
| # arg2 == SIGABRT -- ANDROID(b/270404912): modified to 1 - duplicate error. |
| tgkill: 1 |
| write: 1 |
| writev: 1 |
| fcntl: 1 |
| uname: 1 |
| |
| # ANDROID(b/271625758): disabled to fix duplicate syscall error. |
| # ## Rules for vmm-swap |
| # userfaultfd: 1 |
| # # 0xc018aa3f == UFFDIO_API, 0xaa00 == USERFAULTFD_IOC_NEW |
| # ioctl: arg1 == 0xc018aa3f || arg1 == 0xaa00 |
| |
| copy_file_range: 1 |
| fallocate: 1 |
| fchdir: 1 |
| fchmod: 1 |
| fchmodat: 1 |
| fchown: 1 |
| fchownat: 1 |
| fdatasync: 1 |
| fgetxattr: 1 |
| getxattr: 1 |
| fsetxattr: 1 |
| setxattr: 1 |
| flistxattr: 1 |
| listxattr: 1 |
| fremovexattr: 1 |
| removexattr: 1 |
| fstatfs: 1 |
| fsync: 1 |
| getdents64: 1 |
| getegid: 1 |
| geteuid: 1 |
| getrandom: 1 |
| getresuid: 1 |
| # Use constants for verity ioctls since minijail doesn't understand them yet. |
| # 0x40806685 = FS_IOC_ENABLE_VERITY |
| # 0xc0046686 = FS_IOC_MEASURE_VERITY |
| ioctl: arg1 == FS_IOC_FSGETXATTR || \ |
| arg1 == FS_IOC_FSSETXATTR || \ |
| arg1 == FS_IOC_GETFLAGS || \ |
| arg1 == FS_IOC_SETFLAGS || \ |
| arg1 == FS_IOC_GET_ENCRYPTION_POLICY_EX || \ |
| arg1 == 0x40806685 || \ |
| arg1 == 0xc0046686 |
| linkat: 1 |
| mkdir: 1 |
| mkdirat: 1 |
| mknodat: 1 |
| newfstatat: 1 |
| open: return ENOENT |
| openat: 1 |
| preadv: 1 |
| pwritev: 1 |
| renameat2: 1 |
| setresgid: 1 |
| setresuid: 1 |
| symlinkat: 1 |
| statx: 1 |
| umask: 1 |
| unlinkat: 1 |
| utimensat: 1 |
| prctl: arg0 == PR_SET_NAME || arg0 == PR_SET_SECUREBITS || arg0 == PR_GET_SECUREBITS |
| capget: 1 |
| capset: 1 |
| unshare: 1 |