1# This file is used to populate seccomp's allowlist policy in combination with SYSCALLS.TXT. 2# Note that the resultant policy is applied only to zygote spawned processes. 3# 4# This file is processed by a python script named genseccomp.py. 5 6# Needed for debugging 32-bit Chrome 7int pipe:pipe(int pipefd[2]) lp32 8 9# b/34651972 10int access:access(const char *pathname, int mode) lp32 11int stat64:stat64(const char*, struct stat64*) lp32 12 13# b/34813887 14int open:open(const char *path, int oflag, ... ) lp32,x86_64 15int getdents:getdents(unsigned int fd, struct linux_dirent *dirp, unsigned int count) lp32,x86_64 16 17# b/34719286 18int eventfd:eventfd(unsigned int initval, int flags) lp32 19 20# b/34817266 21int epoll_wait:epoll_wait(int epfd, struct epoll_event *events, int maxevents, int timeout) lp32 22 23# b/34908783 24int epoll_create:epoll_create(int size) lp32 25 26# b/34979910 27int creat:creat(const char *pathname, mode_t mode) lp32 28int unlink:unlink(const char *pathname) lp32 29 30# b/35059702 31int lstat64:lstat64(const char*, struct stat64*) lp32 32 33# b/35217603 34int fcntl:fcntl(int fd, int cmd, ... /* arg */ ) lp32 35pid_t fork:fork() lp32 36int poll:poll(struct pollfd *fds, nfds_t nfds, int timeout) lp32 37 38# b/35906875 39int inotify_init() lp32 40uid_t getuid() lp32 41 42# b/36435222 43int remap_file_pages(void *addr, size_t size, int prot, size_t pgoff, int flags) lp32 44 45# b/36449658 46int rename(const char *oldpath, const char *newpath) lp32 47 48# b/36726183. Note arm does not support mmap 49void* mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset) x86 50 51# b/37769298 52int dup2(int oldfd, int newfd) lp32 53 54# b/62779795 55int compat_select:_newselect(int n, unsigned long* inp, unsigned long* outp, unsigned long* exp, struct timeval* timeout) lp32 56 57# b/62090571 58int mkdir(const char *pathname, mode_t mode) lp32 59