From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:60364) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1UwvQN-0003yD-HI for qemu-devel@nongnu.org; Wed, 10 Jul 2013 10:31:24 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1UwvQI-0002dV-Vk for qemu-devel@nongnu.org; Wed, 10 Jul 2013 10:31:19 -0400 Received: from mx1.redhat.com ([209.132.183.28]:19053) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1UwvQI-0002dD-P4 for qemu-devel@nongnu.org; Wed, 10 Jul 2013 10:31:14 -0400 From: Paul Moore Date: Wed, 10 Jul 2013 10:31:07 -0400 Message-ID: <1536749.nyBeeYseQi@sifl> In-Reply-To: <20130529203001.20939.83322.stgit@localhost> References: <20130529203001.20939.83322.stgit@localhost> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Subject: Re: [Qemu-devel] [PATCH] seccomp: add the asynchronous I/O syscalls to the whitelist List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: coreyb@linux.vnet.ibm.com, otubo@linux.vnet.ibm.com On Wednesday, May 29, 2013 04:30:01 PM Paul Moore wrote: > In order to enable the asynchronous I/O functionality when using the > seccomp sandbox we need to add the associated syscalls to the > whitelist. > > Signed-off-by: Paul Moore > --- > qemu-seccomp.c | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) > > diff --git a/qemu-seccomp.c b/qemu-seccomp.c > index 031da1d..ca123bf 100644 > --- a/qemu-seccomp.c > +++ b/qemu-seccomp.c > @@ -87,6 +87,7 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] > = { { SCMP_SYS(stat), 245 }, > { SCMP_SYS(uname), 245 }, > { SCMP_SYS(eventfd2), 245 }, > + { SCMP_SYS(io_getevents), 245 }, > { SCMP_SYS(dup), 245 }, > { SCMP_SYS(dup2), 245 }, > { SCMP_SYS(dup3), 245 }, > @@ -229,7 +230,9 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { { SCMP_SYS(sendmmsg), 241 }, > { SCMP_SYS(recvmmsg), 241 }, > { SCMP_SYS(prlimit64), 241 }, > - { SCMP_SYS(waitid), 241 } > + { SCMP_SYS(waitid), 241 }, > + { SCMP_SYS(io_setup), 241 }, > + { SCMP_SYS(io_destroy), 241 } > }; > > int seccomp_start(void) Any reason this patch wasn't pulled in for 1.5.1? -- paul moore security and virtualization @ redhat