crosvm/seccomp
Daniel Verkamp 5de0604f29 seccomp: allow statx syscall where stat/fstat was allowed
This is used in Rust 1.40.0's libstd in place of stat/fstat; update the
whitelists to allow the new syscall as well.

BUG=chromium:1042461
TEST=`crosvm disk resize` does not trigger seccomp failure

Change-Id: Ia3f0e49ee009547295c7af7412dfb5eb3ac1efcb
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2003685
Reviewed-by: Chirantan Ekbote <chirantan@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
Commit-Queue: Daniel Verkamp <dverkamp@chromium.org>
2020-01-17 23:04:03 +00:00
..
aarch64 seccomp: allow statx syscall where stat/fstat was allowed 2020-01-17 23:04:03 +00:00
arm seccomp: allow statx syscall where stat/fstat was allowed 2020-01-17 23:04:03 +00:00
x86_64 seccomp: allow statx syscall where stat/fstat was allowed 2020-01-17 23:04:03 +00:00