1# This file is used to populate seccomp's allowlist policy in combination with SYSCALLS.TXT. 2# Note that the resultant policy is applied only to zygote spawned processes. 3# 4# This file is processed by a python script named genseccomp.py. 5 6# Needed for debugging 32-bit Chrome 7pipe(int pipefd[2]) lp32 8 9# b/34651972 10access(const char *pathname, int mode) lp32 11stat64(const char*, struct stat64*) lp32 12 13# b/34813887 14open(const char *path, int oflag, ... ) lp32,x86_64 15getdents(unsigned int fd, struct linux_dirent *dirp, unsigned int count) lp32,x86_64 16 17# b/34719286 18eventfd(unsigned int initval, int flags) lp32 19 20# b/34817266 21epoll_wait(int epfd, struct epoll_event *events, int maxevents, int timeout) lp32 22 23# b/34908783 24epoll_create(int size) lp32 25 26# b/34979910 27creat(const char *pathname, mode_t mode) lp32 28unlink(const char *pathname) lp32 29 30# b/35059702 31lstat64(const char*, struct stat64*) lp32 32 33# b/35217603 34fcntl(int fd, int cmd, ... /* arg */ ) lp32 35fork() lp32 36poll(struct pollfd *fds, nfds_t nfds, int timeout) lp32 37 38# b/35906875 39inotify_init() lp32 40getuid() lp32 41 42# b/36435222 43remap_file_pages(void *addr, size_t size, int prot, size_t pgoff, int flags) lp32 44 45# b/36449658 46rename(const char *oldpath, const char *newpath) lp32 47 48# b/36726183. Note arm does not support mmap 49mmap(void *addr, size_t length, int prot, int flags, int fd, off_t offset) x86 50 51# b/37769298 52dup2(int oldfd, int newfd) lp32 53 54# b/62779795 55compat_select:_newselect(int n, unsigned long* inp, unsigned long* outp, unsigned long* exp, struct timeval* timeout) lp32 56 57# b/62090571 58mkdir(const char *pathname, mode_t mode) lp32 59 60# Not used by bionic in U because riscv64 doesn't have it, but still 61# used by legacy apps (http://b/254179267). 62renameat(int, const char*, int, const char*) arm,x86,arm64,x86_64 63