# This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. # Note that the resultant policy is applied only to zygote spawned processes. # # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file # # Each non-blank, non-comment line has the following format: # # return_type func_name[|alias_list][:syscall_name[:socketcall_id]]([parameter_list]) arch_list # # where: # arch_list ::= "all" | arch+ # arch ::= "arm" | "arm64" | "mips" | "mips64" | "x86" | "x86_64" # # Note: # - syscall_name corresponds to the name of the syscall, which may differ from # the exported function name (example: the exit syscall is implemented by the _exit() # function, which is not the same as the standard C exit() function which calls it) # - alias_list is optional comma separated list of function aliases # # - The call_id parameter, given that func_name and syscall_name have # been provided, allows the user to specify dispatch style syscalls. # For example, socket() syscall on i386 actually becomes: # socketcall(__NR_socket, 1, *(rest of args on stack)). # # - Each parameter type is assumed to be stored in 32 bits. # # This file is processed by a python script named genseccomp.py. # Note: Some privileged syscalls are still needed in app process after fork before uid change, # including capset and setresuid. This is because the seccomp filter must be installed while # the process still has CAP_SYS_ADMIN; changing the uid would remove that capability. # syscalls to modify IDs int setgid:setgid32(gid_t) arm,x86 int setgid:setgid(gid_t) arm64,mips,mips64,x86_64 int setuid:setuid32(uid_t) arm,x86 int setuid:setuid(uid_t) arm64,mips,mips64,x86_64 int setregid:setregid32(gid_t, gid_t) arm,x86 int setregid:setregid(gid_t, gid_t) arm64,mips,mips64,x86_64 int setreuid:setreuid32(uid_t, uid_t) arm,x86 int setreuid:setreuid(uid_t, uid_t) arm64,mips,mips64,x86_64 int setresgid:setresgid32(gid_t, gid_t, gid_t) arm,x86 int setresgid:setresgid(gid_t, gid_t, gid_t) arm64,mips,mips64,x86_64 # setresuid is explicitly allowed, see above. int setfsgid(gid_t) all int setfsuid(uid_t) all int setgroups:setgroups32(int, const gid_t*) arm,x86 int setgroups:setgroups(int, const gid_t*) arm64,mips,mips64,x86_64 # syscalls to modify times int adjtimex(struct timex*) all int clock_adjtime(clockid_t, struct timex*) all int clock_settime(clockid_t, const struct timespec*) all int settimeofday(const struct timeval*, const struct timezone*) all int acct(const char* filepath) all int klogctl:syslog(int, char*, int) all int chroot(const char*) all # syscalls to change machine various configurations int init_module(void*, unsigned long, const char*) all int delete_module(const char*, unsigned int) all int mount(const char*, const char*, const char*, unsigned long, const void*) all int umount2(const char*, int) all int swapon(const char*, int) all int swapoff(const char*) all int setdomainname(const char*, size_t) all int sethostname(const char*, size_t) all int __reboot:reboot(int, int, int, void*) all