On Wednesday, May 29, 2013 04:30:01 PM Paul Moore wrote:
> In order to enable the asynchronous I/O functionality when using the
> seccomp sandbox we need to add the associated syscalls to the
> whitelist.
> 
> Signed-off-by: Paul Moore <pmo...@redhat.com>
> ---
>  qemu-seccomp.c |    5 ++++-
>  1 file changed, 4 insertions(+), 1 deletion(-)
> 
> diff --git a/qemu-seccomp.c b/qemu-seccomp.c
> index 031da1d..ca123bf 100644
> --- a/qemu-seccomp.c
> +++ b/qemu-seccomp.c
> @@ -87,6 +87,7 @@ static const struct QemuSeccompSyscall seccomp_whitelist[]
> = { { SCMP_SYS(stat), 245 },
>      { SCMP_SYS(uname), 245 },
>      { SCMP_SYS(eventfd2), 245 },
> +    { SCMP_SYS(io_getevents), 245 },
>      { SCMP_SYS(dup), 245 },
>      { SCMP_SYS(dup2), 245 },
>      { SCMP_SYS(dup3), 245 },
> @@ -229,7 +230,9 @@ static const struct QemuSeccompSyscall
> seccomp_whitelist[] = { { SCMP_SYS(sendmmsg), 241 },
>      { SCMP_SYS(recvmmsg), 241 },
>      { SCMP_SYS(prlimit64), 241 },
> -    { SCMP_SYS(waitid), 241 }
> +    { SCMP_SYS(waitid), 241 },
> +    { SCMP_SYS(io_setup), 241 },
> +    { SCMP_SYS(io_destroy), 241 }
>  };
> 
>  int seccomp_start(void)

Any reason this patch wasn't pulled in for 1.5.1?

-- 
paul moore
security and virtualization @ redhat


Reply via email to