1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT. 2 # Note that the resultant policy is applied only to zygote spawned processes. 3 # 4 # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file 6 # 7 # Each non-blank, non-comment line has the following format: 8 # 9 # return_type func_name[|alias_list][:syscall_name[:socketcall_id]]([parameter_list]) arch_list 10 # 11 # where: 12 # arch_list ::= "all" | arch+ 13 # arch ::= "arm" | "arm64" | "mips" | "mips64" | "x86" | "x86_64" 14 # 15 # Note: 16 # - syscall_name corresponds to the name of the syscall, which may differ from 17 # the exported function name (example: the exit syscall is implemented by the _exit() 18 # function, which is not the same as the standard C exit() function which calls it) 19 20 # - alias_list is optional comma separated list of function aliases 21 # 22 # - The call_id parameter, given that func_name and syscall_name have 23 # been provided, allows the user to specify dispatch style syscalls. 24 # For example, socket() syscall on i386 actually becomes: 25 # socketcall(__NR_socket, 1, *(rest of args on stack)). 26 # 27 # - Each parameter type is assumed to be stored in 32 bits. 28 # 29 # This file is processed by a python script named genseccomp.py. 30 31 # Note: Some privileged syscalls are still needed in app process after fork before uid change, 32 # including capset and setresuid. This is because the seccomp filter must be installed while 33 # the process still has CAP_SYS_ADMIN; changing the uid would remove that capability. 34 35 # syscalls to modify IDs 36 int setgid:setgid32(gid_t) arm,x86 37 int setgid:setgid(gid_t) arm64,mips,mips64,x86_64 38 int setuid:setuid32(uid_t) arm,x86 39 int setuid:setuid(uid_t) arm64,mips,mips64,x86_64 40 int setregid:setregid32(gid_t, gid_t) arm,x86 41 int setregid:setregid(gid_t, gid_t) arm64,mips,mips64,x86_64 42 int setreuid:setreuid32(uid_t, uid_t) arm,x86 43 int setreuid:setreuid(uid_t, uid_t) arm64,mips,mips64,x86_64 44 int setresgid:setresgid32(gid_t, gid_t, gid_t) arm,x86 45 int setresgid:setresgid(gid_t, gid_t, gid_t) arm64,mips,mips64,x86_64 46 # setresuid is explicitly allowed, see above. 47 int setfsgid(gid_t) all 48 int setfsuid(uid_t) all 49 int setgroups:setgroups32(int, const gid_t*) arm,x86 50 int setgroups:setgroups(int, const gid_t*) arm64,mips,mips64,x86_64 51 52 # syscalls to modify times 53 int adjtimex(struct timex*) all 54 int clock_adjtime(clockid_t, struct timex*) all 55 int clock_settime(clockid_t, const struct timespec*) all 56 int settimeofday(const struct timeval*, const struct timezone*) all 57 58 int acct(const char* filepath) all 59 int klogctl:syslog(int, char*, int) all 60 int chroot(const char*) all 61 62 # syscalls to change machine various configurations 63 int init_module(void*, unsigned long, const char*) all 64 int delete_module(const char*, unsigned int) all 65 int mount(const char*, const char*, const char*, unsigned long, const void*) all 66 int umount2(const char*, int) all 67 int swapon(const char*, int) all 68 int swapoff(const char*) all 69 int setdomainname(const char*, size_t) all 70 int sethostname(const char*, size_t) all 71 int __reboot:reboot(int, int, int, void*) all 72