1# This file is used to populate seccomp's allowlist policy in combination with SYSCALLS.TXT.
2# Note that the resultant policy is applied only to zygote spawned processes.
3#
4# This file is processed by a python script named genseccomp.py.
5
6# Needed for debugging 32-bit Chrome
7int	pipe:pipe(int pipefd[2])	lp32
8
9# b/34651972
10int	access:access(const char *pathname, int mode)	lp32
11int	stat64:stat64(const char*, struct stat64*)	lp32
12
13# b/34813887
14int	open:open(const char *path, int oflag, ... ) lp32,x86_64
15int	getdents:getdents(unsigned int fd, struct linux_dirent *dirp, unsigned int count) lp32,x86_64
16
17# b/34719286
18int	eventfd:eventfd(unsigned int initval, int flags)	lp32
19
20# b/34817266
21int	epoll_wait:epoll_wait(int epfd, struct epoll_event *events, int maxevents, int timeout)	lp32
22
23# b/34908783
24int	epoll_create:epoll_create(int size)	lp32
25
26# b/34979910
27int	creat:creat(const char *pathname, mode_t mode)	lp32
28int	unlink:unlink(const char *pathname)	lp32
29
30# b/35059702
31int	lstat64:lstat64(const char*, struct stat64*)	lp32
32
33# b/35217603
34int	fcntl:fcntl(int fd, int cmd, ... /* arg */ )	lp32
35pid_t	fork:fork()	lp32
36int	poll:poll(struct pollfd *fds, nfds_t nfds, int timeout)	lp32
37
38# b/35906875
39int	inotify_init()	lp32
40uid_t	getuid()	lp32
41
42# b/36435222
43int	remap_file_pages(void *addr, size_t size, int prot, size_t pgoff, int flags)	lp32
44
45# b/36449658
46int	rename(const char *oldpath, const char *newpath)	lp32
47
48# b/36726183. Note arm does not support mmap
49void*	mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset)	x86
50
51# b/37769298
52int dup2(int oldfd, int newfd)	lp32
53
54# b/62779795
55int compat_select:_newselect(int n, unsigned long* inp, unsigned long* outp, unsigned long* exp, struct timeval* timeout) lp32
56
57# b/62090571
58int mkdir(const char *pathname, mode_t mode)	lp32
59