platform_bionic/libc/SECCOMP_WHITELIST_APP.TXT

59 lines
1.8 KiB
Text
Raw Normal View History

# This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT.
# Note that the resultant policy is applied only to zygote spawned processes.
#
# This file is processed by a python script named genseccomp.py.
# Needed for debugging 32-bit Chrome
int pipe:pipe(int pipefd[2]) lp32
# b/34651972
int access:access(const char *pathname, int mode) lp32
int stat64:stat64(const char*, struct stat64*) lp32
# b/34813887
int open:open(const char *path, int oflag, ... ) lp32,x86_64
int getdents:getdents(unsigned int fd, struct linux_dirent *dirp, unsigned int count) lp32,x86_64
# b/34719286
int eventfd:eventfd(unsigned int initval, int flags) lp32
# b/34817266
int epoll_wait:epoll_wait(int epfd, struct epoll_event *events, int maxevents, int timeout) lp32
# b/34908783
int epoll_create:epoll_create(int size) lp32
# b/34979910
int creat:creat(const char *pathname, mode_t mode) lp32
int unlink:unlink(const char *pathname) lp32
# b/35059702
int lstat64:lstat64(const char*, struct stat64*) lp32
# b/35217603
int fcntl:fcntl(int fd, int cmd, ... /* arg */ ) lp32
pid_t fork:fork() lp32
int poll:poll(struct pollfd *fds, nfds_t nfds, int timeout) lp32
# b/35906875
int inotify_init() lp32
uid_t getuid() lp32
# b/36435222
int remap_file_pages(void *addr, size_t size, int prot, size_t pgoff, int flags) lp32
# b/36449658
int rename(const char *oldpath, const char *newpath) lp32
# b/36726183. Note arm does not support mmap
void* mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset) x86
# b/37769298
int dup2(int oldfd, int newfd) lp32
# b/62779795
int compat_select:_newselect(int n, unsigned long* inp, unsigned long* outp, unsigned long* exp, struct timeval* timeout) lp32
# b/62090571
int mkdir(const char *pathname, mode_t mode) lp32