blob: 5c317cf8e0d405f4d1209cf421a6f5bbc32e7d07 [file] [log] [blame]
# This file is used to populate seccomp's allowlist policy in combination with SYSCALLS.TXT.
# Note that the resultant policy is applied only to zygote spawned processes.
#
# The final seccomp allowlist is SYSCALLS.TXT - SECCOMP_BLOCKLIST.TXT + SECCOMP_ALLOWLIST.TXT
# Any entry in the blocklist must be in the syscalls file and not be in the allowlist file
#
# This file is processed by a python script named genseccomp.py.
# Syscalls to modify IDs.
# Note: Some privileged syscalls are still needed in app_process after fork but
# before uid change, including capset and setresuid. This is because the seccomp
# filter must be installed while the process still has CAP_SYS_ADMIN; changing
# the uid would remove that capability.
setgid32(gid_t) lp32
setgid(gid_t) lp64
setuid32(uid_t) lp32
setuid(uid_t) lp64
setregid32(gid_t, gid_t) lp32
setregid(gid_t, gid_t) lp64
setreuid32(uid_t, uid_t) lp32
setreuid(uid_t, uid_t) lp64
setresgid32(gid_t, gid_t, gid_t) lp32
setresgid(gid_t, gid_t, gid_t) lp64
# setresuid is explicitly allowed, see above.
setfsgid32(gid_t) lp32
setfsgid(gid_t) lp64
setfsuid32(uid_t) lp32
setfsuid(uid_t) lp64
setgroups32(int, const gid_t*) lp32
setgroups(int, const gid_t*) lp64
# Syscalls to modify times.
adjtimex(struct timex*) all
clock_adjtime(clockid_t, struct timex*) all
clock_settime(clockid_t, const struct timespec*) all
settimeofday(const struct timeval*, const struct timezone*) all
acct(const char* filepath) all
syslog(int, char*, int) all
chroot(const char*) all
init_module(void*, unsigned long, const char*) all
delete_module(const char*, unsigned int) all
mount(const char*, const char*, const char*, unsigned long, const void*) all
umount2(const char*, int) all
swapon(const char*, int) all
swapoff(const char*) all
setdomainname(const char*, size_t) all
sethostname(const char*, size_t) all
reboot(int, int, int, void*) all