Home | History | Annotate | Download | only in libc
      1 # This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT.
      2 # Note that the resultant policy is applied only to zygote spawned processes.
      3 #
      4 # The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT
      5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file
      6 #
      7 # Each non-blank, non-comment line has the following format:
      8 #
      9 # return_type func_name[|alias_list][:syscall_name[:socketcall_id]]([parameter_list]) arch_list
     10 #
     11 # where:
     12 #       arch_list ::= "all" | arch+
     13 #       arch      ::= "arm" | "arm64" | "mips" | "mips64" | "x86" | "x86_64"
     14 #
     15 # Note:
     16 #      - syscall_name corresponds to the name of the syscall, which may differ from
     17 #        the exported function name (example: the exit syscall is implemented by the _exit()
     18 #        function, which is not the same as the standard C exit() function which calls it)
     19 
     20 #      - alias_list is optional comma separated list of function aliases
     21 #
     22 #      - The call_id parameter, given that func_name and syscall_name have
     23 #        been provided, allows the user to specify dispatch style syscalls.
     24 #        For example, socket() syscall on i386 actually becomes:
     25 #          socketcall(__NR_socket, 1, *(rest of args on stack)).
     26 #
     27 #      - Each parameter type is assumed to be stored in 32 bits.
     28 #
     29 # This file is processed by a python script named genseccomp.py.
     30 
     31 # Note: Some privileged syscalls are still needed in app process after fork before uid change,
     32 # including capset and setresuid. This is because the seccomp filter must be installed while
     33 # the process still has CAP_SYS_ADMIN; changing the uid would remove that capability.
     34 
     35 # syscalls to modify IDs
     36 int     setgid:setgid32(gid_t)     arm,x86
     37 int     setgid:setgid(gid_t)       arm64,mips,mips64,x86_64
     38 int     setuid:setuid32(uid_t)    arm,x86
     39 int     setuid:setuid(uid_t)      arm64,mips,mips64,x86_64
     40 int     setregid:setregid32(gid_t, gid_t)  arm,x86
     41 int     setregid:setregid(gid_t, gid_t)    arm64,mips,mips64,x86_64
     42 int     setreuid:setreuid32(uid_t, uid_t)   arm,x86
     43 int     setreuid:setreuid(uid_t, uid_t)     arm64,mips,mips64,x86_64
     44 int     setresgid:setresgid32(gid_t, gid_t, gid_t)   arm,x86
     45 int     setresgid:setresgid(gid_t, gid_t, gid_t)     arm64,mips,mips64,x86_64
     46 # setresuid is explicitly allowed, see above.
     47 int     setfsgid(gid_t)  all
     48 int     setfsuid(uid_t)  all
     49 int     setgroups:setgroups32(int, const gid_t*)   arm,x86
     50 int     setgroups:setgroups(int, const gid_t*)     arm64,mips,mips64,x86_64
     51 
     52 # syscalls to modify times
     53 int     adjtimex(struct timex*)   all
     54 int     clock_adjtime(clockid_t, struct timex*)   all
     55 int     clock_settime(clockid_t, const struct timespec*)  all
     56 int     settimeofday(const struct timeval*, const struct timezone*)   all
     57 
     58 int     acct(const char*  filepath)  all
     59 int     klogctl:syslog(int, char*, int)   all
     60 int     chroot(const char*)  all
     61 
     62 # syscalls to change machine various configurations
     63 int     init_module(void*, unsigned long, const char*)  all
     64 int     delete_module(const char*, unsigned int)   all
     65 int     mount(const char*, const char*, const char*, unsigned long, const void*)  all
     66 int     umount2(const char*, int)  all
     67 int     swapon(const char*, int) all
     68 int     swapoff(const char*) all
     69 int     setdomainname(const char*, size_t)  all
     70 int     sethostname(const char*, size_t)  all
     71 int     __reboot:reboot(int, int, int, void*)  all
     72