• Home
Name Date Size #Lines LOC

..--

aarch64/03-May-2024-2,8552,759

arm/03-May-2024-3,0162,924

x86_64/03-May-2024-3,3363,187

Android.bpD03-May-202440.8 KiB1,6181,469

README.mdD03-May-20242.1 KiB3829

crosvm_seccomp_policy_product_packages.mkD03-May-20243.3 KiB8162

detect_duplication.pyD03-May-20241 KiB3010

gen_android.shD03-May-20247 KiB233199

generate_constants.shD03-May-20241.5 KiB5838

policy-inliner.shD03-May-20242.2 KiB6141

README.md

1# Policy files for crosvm
2
3This folder holds the seccomp policies for crosvm devices, organized by architecture.
4
5Each crosvm device can run within its owned jailed process. A jailed process is only able to perform
6the system calls specified in the seccomp policy file the jail has been created with, which improves
7security as a rogue process cannot perform any system call it wants.
8
9Each device can run from different contexts, which require a different set of authorized system
10calls. This file explains how the policy files are named in order to allow these various scenario.
11
12## Naming conventions
13
14Since Minijail only allows for one level of policy inclusion, we need to be a little bit creative in
15order to minimize policy duplication.
16
17- `common_device.policy` contains a set of syscalls that are common to all devices, and is never
18  loaded directly - only included from other policy files.
19- `foo.policy` contains the set of syscalls that device `foo` is susceptible to use, regardless of
20  the underlying virtio transport. This policy is also never loaded directly.
21- `foo_device.policy` is the policy that is loaded when device `foo` is used as an in-VMM (i.e.
22  regular virtio) device. It will generally simply include `common_device.policy` as well as
23  `foo.policy`.
24
25When using vhost-user, the virtio protocol needs to be sent over a different medium, e.g. a Unix
26socket. Supporting this transport requires some extra system calls after the device is jailed, and
27thus dedicated policies:
28
29- `vhost_user.policy` contains the set of syscalls required by the regular (i.e. socket-based)
30  vhost-user listener. It is never loaded directly.
31- `vvu.policy` contains the set of syscalls required by the VFIO-based vhost-user (aka
32  Virtio-Vhost-User) listener. It is also never loaded directly.
33- `foo_device_vhost_user.policy` is the policy that is loaded when device `foo` is used as a regular
34  vhost-user device. It will generally include `common_device.policy`, `vhost_user.policy` and
35  `foo.policy`.
36- `foo_device_vvu.policy` is the policy that is loaded when device `foo` is used as a VVU device. It
37  will generally include `common_device.policy`, `vvu.policy` and `foo.policy`.
38