blob: b7a05c47130ecb07a0da766815696923f8333556 [file] [log] [blame]
Victor Hsieh2f23ced2018-01-17 16:59:12 -08001# This file is used to populate seccomp's whitelist policy in combination with SYSCALLS.TXT.
2# Note that the resultant policy is applied only to zygote spawned processes.
3#
4# The final seccomp whitelist is SYSCALLS.TXT - SECCOMP_BLACKLIST.TXT + SECCOMP_WHITELIST.TXT
5# Any entry in the blacklist must be in the syscalls file and not be in the whitelist file
6#
7# Each non-blank, non-comment line has the following format:
8#
9# return_type func_name[|alias_list][:syscall_name[:socketcall_id]]([parameter_list]) arch_list
10#
11# where:
12# arch_list ::= "all" | arch+
13# arch ::= "arm" | "arm64" | "mips" | "mips64" | "x86" | "x86_64"
14#
15# Note:
16# - syscall_name corresponds to the name of the syscall, which may differ from
17# the exported function name (example: the exit syscall is implemented by the _exit()
18# function, which is not the same as the standard C exit() function which calls it)
19
20# - alias_list is optional comma separated list of function aliases
21#
22# - The call_id parameter, given that func_name and syscall_name have
23# been provided, allows the user to specify dispatch style syscalls.
24# For example, socket() syscall on i386 actually becomes:
25# socketcall(__NR_socket, 1, *(rest of args on stack)).
26#
27# - Each parameter type is assumed to be stored in 32 bits.
28#
29# This file is processed by a python script named genseccomp.py.
30
Victor Hsiehe15233c2018-03-28 16:30:20 -070031# Note: Some privileged syscalls are still needed in app process after fork before uid change,
Martijn Coenene17fce12019-01-21 14:29:35 +010032# including capset and setresuid. This is because the seccomp filter must be installed while
33# the process still has CAP_SYS_ADMIN; changing the uid would remove that capability.
Victor Hsiehe15233c2018-03-28 16:30:20 -070034
Victor Hsieh2f23ced2018-01-17 16:59:12 -080035# syscalls to modify IDs
36int setgid:setgid32(gid_t) arm,x86
37int setgid:setgid(gid_t) arm64,mips,mips64,x86_64
38int setuid:setuid32(uid_t) arm,x86
39int setuid:setuid(uid_t) arm64,mips,mips64,x86_64
Martijn Coenene17fce12019-01-21 14:29:35 +010040int setregid:setregid32(gid_t, gid_t) arm,x86
41int setregid:setregid(gid_t, gid_t) arm64,mips,mips64,x86_64
Victor Hsieh2f23ced2018-01-17 16:59:12 -080042int setreuid:setreuid32(uid_t, uid_t) arm,x86
43int setreuid:setreuid(uid_t, uid_t) arm64,mips,mips64,x86_64
Victor Hsieh2f23ced2018-01-17 16:59:12 -080044int setresgid:setresgid32(gid_t, gid_t, gid_t) arm,x86
45int setresgid:setresgid(gid_t, gid_t, gid_t) arm64,mips,mips64,x86_64
Martijn Coenene17fce12019-01-21 14:29:35 +010046# setresuid is explicitly allowed, see above.
Victor Hsieh2f23ced2018-01-17 16:59:12 -080047int setfsgid(gid_t) all
48int setfsuid(uid_t) all
49int setgroups:setgroups32(int, const gid_t*) arm,x86
50int setgroups:setgroups(int, const gid_t*) arm64,mips,mips64,x86_64
51
52# syscalls to modify times
53int adjtimex(struct timex*) all
54int clock_adjtime(clockid_t, struct timex*) all
55int clock_settime(clockid_t, const struct timespec*) all
56int settimeofday(const struct timeval*, const struct timezone*) all
57
58int acct(const char* filepath) all
59int klogctl:syslog(int, char*, int) all
Victor Hsieh2f23ced2018-01-17 16:59:12 -080060int chroot(const char*) all
61
62# syscalls to change machine various configurations
63int init_module(void*, unsigned long, const char*) all
64int delete_module(const char*, unsigned int) all
65int mount(const char*, const char*, const char*, unsigned long, const void*) all
66int umount2(const char*, int) all
67int swapon(const char*, int) all
68int swapoff(const char*) all
69int setdomainname(const char*, size_t) all
70int sethostname(const char*, size_t) all
71int __reboot:reboot(int, int, int, void*) all