commit | 8d70c18b16bb65eeabb11c7760678c6efba8d19a | [log] [tgz] |
---|---|---|
author | Daniel Verkamp <dverkamp@chromium.org> | Thu Nov 17 10:39:12 2022 -0800 |
committer | crosvm LUCI <crosvm-scoped@luci-project-accounts.iam.gserviceaccount.com> | Thu Nov 17 18:59:56 2022 +0000 |
tree | b1888a84da52dcb40faac9992c90ba04dafa1f9d | |
parent | fcbe42bb3195e687b0e30fd22b304ea80409664a [diff] |
tests: plugin: add clone3 and rseq to seccomp policy These syscalls are used by the plugin test child process on newer glibc and kernel versions. Without them, the plugin tests fail because the child processes die with SIGSYS. BUG=None TEST=tools/dev_container tools/presubmit --all Change-Id: Id56831cf146e1e0f24f700744d6db902133ecc62 Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/4034381 Reviewed-by: Zihan Chen <zihanchen@google.com> Commit-Queue: Daniel Verkamp <dverkamp@chromium.org>
crosvm is a virtual machine monitor (VMM) based on Linux’s KVM hypervisor, with a focus on simplicity, security, and speed. crosvm is intended to run Linux guests, originally as a security boundary for running native applications on the Chrome OS platform. Compared to QEMU, crosvm doesn’t emulate architectures or real hardware, instead concentrating on paravirtualized devices, such as the virtio standard.
crosvm is currently used to run Linux/Android guests on Chrome OS devices.