diff options
| author | Andrey Artemiev <artemiev@google.com> | 2022-07-12 17:06:16 -0700 |
|---|---|---|
| committer | Aleksandr Nogikh <wp32pw@gmail.com> | 2022-07-19 19:37:54 +0200 |
| commit | 775344bcdc412431da5fa825b1012f0290fc8064 (patch) | |
| tree | 3f039e7c24f2242b354f65dc22b4b9e022a27423 /executor/android | |
| parent | 72a3cc0c8dfd0116bb3ecf36eb5983ec3cae691c (diff) | |
executor: added code to run Android with System account
Diffstat (limited to 'executor/android')
| -rw-r--r-- | executor/android/android_seccomp.h | 37 | ||||
| -rw-r--r-- | executor/android/arm64_system_policy.h | 56 | ||||
| -rw-r--r-- | executor/android/arm_system_policy.h | 152 | ||||
| -rw-r--r-- | executor/android/x86_64_system_policy.h | 110 | ||||
| -rw-r--r-- | executor/android/x86_system_policy.h | 146 |
5 files changed, 494 insertions, 7 deletions
diff --git a/executor/android/android_seccomp.h b/executor/android/android_seccomp.h index f3febac2c..8546350c5 100644 --- a/executor/android/android_seccomp.h +++ b/executor/android/android_seccomp.h @@ -7,6 +7,9 @@ #include "arm64_app_policy.h" static const struct sock_filter* primary_app_filter = arm64_app_filter; static const size_t primary_app_filter_size = arm64_app_filter_size; +#include "arm64_system_policy.h" +static const struct sock_filter* system_filter = arm64_system_filter; +static const size_t system_filter_size = arm64_system_filter_size; // We need 3 for ValidateArchitecture and 1 for ExamineSyscall and 4 for ValidateArchitectureAndJumpIfNeeded + 2 extra Disallow #define kFilterMaxSize (arm64_app_filter_size + 3 + 1 + 4 + 2) @@ -15,6 +18,9 @@ static const size_t primary_app_filter_size = arm64_app_filter_size; #include "arm_app_policy.h" static const struct sock_filter* primary_app_filter = arm_app_filter; static const size_t primary_app_filter_size = arm_app_filter_size; +#include "arm_system_policy.h" +static const struct sock_filter* system_filter = arm_system_filter; +static const size_t system_filter_size = arm_system_filter_size; #define kFilterMaxSize (arm_app_filter_size + 3 + 1 + 4 + 2) #elif GOARCH_amd64 @@ -22,6 +28,9 @@ static const size_t primary_app_filter_size = arm_app_filter_size; #include "x86_64_app_policy.h" static const struct sock_filter* primary_app_filter = x86_64_app_filter; static const size_t primary_app_filter_size = x86_64_app_filter_size; +#include "x86_64_system_policy.h" +static const struct sock_filter* system_filter = x86_64_system_filter; +static const size_t system_filter_size = x86_64_system_filter_size; #define kFilterMaxSize (x86_64_app_filter_size + 3 + 1 + 4 + 2) #elif GOARCH_386 @@ -29,6 +38,9 @@ static const size_t primary_app_filter_size = x86_64_app_filter_size; #include "x86_app_policy.h" static const struct sock_filter* primary_app_filter = x86_app_filter; static const size_t primary_app_filter_size = x86_app_filter_size; +#include "x86_system_policy.h" +static const struct sock_filter* system_filter = x86_system_filter; +static const size_t system_filter_size = x86_system_filter_size; #define kFilterMaxSize (x86_app_filter_size + 3 + 1 + 4 + 2) #else @@ -83,21 +95,32 @@ static void install_filter(const Filter* f) failmsg("could not set seccomp filter", "size=%zu", f->count); } -// Modified from the orignal Android code as we don't need dual arch support -static void set_app_seccomp_filter() +// Modified from the original Android code as we don't need dual arch support +static void set_seccomp_filter(const struct sock_filter* filter, size_t size) { - const struct sock_filter* p = primary_app_filter; - size_t p_size = primary_app_filter_size; - Filter f; f.count = 0; ValidateArchitecture(&f); ExamineSyscall(&f); - for (size_t i = 0; i < p_size; ++i) - push_back(&f, p[i]); + for (size_t i = 0; i < size; ++i) + push_back(&f, filter[i]); Disallow(&f); // Will fail() if anything fails. install_filter(&f); } + +enum { + SCFS_RestrictedApp, + SCFS_SystemAccount +}; + +static void set_app_seccomp_filter(int account) +{ + if (account == SCFS_SystemAccount) { + set_seccomp_filter(system_filter, system_filter_size); + } else { + set_seccomp_filter(primary_app_filter, primary_app_filter_size); + } +} diff --git a/executor/android/arm64_system_policy.h b/executor/android/arm64_system_policy.h new file mode 100644 index 000000000..44dab4250 --- /dev/null +++ b/executor/android/arm64_system_policy.h @@ -0,0 +1,56 @@ +// Copyright 2022 syzkaller project authors. All rights reserved. +// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. + +// File autogenerated by genseccomp.py from Android U - edit at your peril!! + +const struct sock_filter arm64_system_filter[] = { +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 0, 0, 46), +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 98, 44, 0), //futex +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 29, 43, 0), //ioctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 226, 21, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 101, 11, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 43, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 30, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 19, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 18, 38, 37), //io_setup|io_destroy|io_submit|io_cancel|io_getevents|setxattr|lsetxattr|fsetxattr|getxattr|lgetxattr|fgetxattr|listxattr|llistxattr|flistxattr|removexattr|lremovexattr|fremovexattr|getcwd +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 29, 37, 36), //eventfd2|epoll_create1|epoll_ctl|epoll_pwait|dup|dup3|fcntl|inotify_init1|inotify_add_watch|inotify_rm_watch +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 42, 36, 35), //ioprio_set|ioprio_get|flock|mknodat|mkdirat|unlinkat|symlinkat|linkat|renameat|umount2|mount|pivot_root +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 99, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 59, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 58, 33, 32), //statfs|fstatfs|truncate|ftruncate|fallocate|faccessat|chdir|fchdir|chroot|fchmod|fchmodat|fchownat|fchown|openat|close +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 98, 32, 31), //pipe2|quotactl|getdents64|lseek|read|write|readv|writev|pread64|pwrite64|preadv|pwritev|sendfile|pselect6|ppoll|signalfd4|vmsplice|splice|tee|readlinkat|newfstatat|fstat|sync|fsync|fdatasync|sync_file_range|timerfd_create|timerfd_settime|timerfd_gettime|utimensat|acct|capget|capset|personality|exit|exit_group|waitid|set_tid_address|unshare +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 100, 31, 30), //set_robust_list +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 203, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 198, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 105, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 104, 27, 26), //nanosleep|getitimer|setitimer +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 180, 26, 25), //init_module|delete_module|timer_create|timer_gettime|timer_getoverrun|timer_settime|timer_delete|clock_settime|clock_gettime|clock_getres|clock_nanosleep|syslog|ptrace|sched_setparam|sched_setscheduler|sched_getscheduler|sched_getparam|sched_setaffinity|sched_getaffinity|sched_yield|sched_get_priority_max|sched_get_priority_min|sched_rr_get_interval|restart_syscall|kill|tkill|tgkill|sigaltstack|rt_sigsuspend|rt_sigaction|rt_sigprocmask|rt_sigpending|rt_sigtimedwait|rt_sigqueueinfo|rt_sigreturn|setpriority|getpriority|reboot|setregid|setgid|setreuid|setuid|setresuid|getresuid|setresgid|getresgid|setfsuid|setfsgid|times|setpgid|getpgid|getsid|setsid|getgroups|setgroups|uname|sethostname|setdomainname|getrlimit|setrlimit|getrusage|umask|prctl|getcpu|gettimeofday|settimeofday|adjtimex|getpid|getppid|getuid|geteuid|getgid|getegid|gettid|sysinfo +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 202, 25, 24), //socket|socketpair|bind|listen +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 220, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 217, 23, 22), //connect|getsockname|getpeername|sendto|recvfrom|setsockopt|getsockopt|shutdown|sendmsg|recvmsg|readahead|brk|munmap|mremap +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 224, 22, 21), //clone|execve|mmap|fadvise64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 424, 11, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 266, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 260, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 240, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 234, 17, 16), //mprotect|msync|mlock|munlock|mlockall|munlockall|mincore|madvise +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 244, 16, 15), //rt_tgsigqueueinfo|perf_event_open|accept4|recvmmsg +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 262, 15, 14), //wait4|prlimit64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 291, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 274, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 272, 12, 11), //clock_adjtime|syncfs|setns|sendmmsg|process_vm_readv|process_vm_writev +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 288, 11, 10), //sched_setattr|sched_getattr|renameat2|seccomp|getrandom|memfd_create|bpf|execveat|userfaultfd|membarrier|mlock2|copy_file_range|preadv2|pwritev2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 292, 10, 9), //statx +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 438, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 436, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 434, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 425, 6, 5), //pidfd_send_signal +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 435, 5, 4), //pidfd_open +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 437, 4, 3), //close_range +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 440, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 439, 2, 1), //pidfd_getfd +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 441, 1, 0), //process_madvise +BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), +}; + +#define arm64_system_filter_size (sizeof(arm64_system_filter) / sizeof(struct sock_filter)) diff --git a/executor/android/arm_system_policy.h b/executor/android/arm_system_policy.h new file mode 100644 index 000000000..29bd4079d --- /dev/null +++ b/executor/android/arm_system_policy.h @@ -0,0 +1,152 @@ +// Copyright 2022 syzkaller project authors. All rights reserved. +// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. + +// File autogenerated by genseccomp.py from Android U - edit at your peril!! + +const struct sock_filter arm_system_filter[] = { +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 0, 0, 142), +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 240, 140, 0), //futex +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 54, 139, 0), //ioctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 197, 69, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 91, 35, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 51, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 36, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 19, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 11, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 3, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 2, 132, 131), //restart_syscall|exit +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 7, 131, 130), //read|write|open|close +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 13, 130, 129), //execve|chdir +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 26, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 22, 128, 127), //lseek|getpid|mount +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 27, 127, 126), //ptrace +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 43, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 41, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 38, 124, 123), //sync|kill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 42, 123, 122), //dup +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 45, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 44, 121, 120), //times +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 46, 120, 119), //brk +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 74, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 64, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 60, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 57, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 53, 115, 114), //acct|umount2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 58, 114, 113), //setpgid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 62, 113, 112), //umask|chroot +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 66, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 65, 111, 110), //getppid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 68, 110, 109), //setsid|sigaction +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 85, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 77, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 76, 107, 106), //sethostname|setrlimit +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 80, 106, 105), //getrusage|gettimeofday|settimeofday +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 88, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 86, 104, 103), //readlink +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 89, 103, 102), //reboot +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 131, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 116, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 103, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 96, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 94, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 93, 97, 96), //munmap|truncate +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 95, 96, 95), //fchmod +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 98, 95, 94), //getpriority|setpriority +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 114, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 107, 93, 92), //syslog|setitimer|getitimer|stat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 115, 92, 91), //wait4 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 124, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 118, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 117, 89, 88), //sysinfo +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 123, 88, 87), //fsync|sigreturn|clone|setdomainname|uname +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 128, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 126, 86, 85), //adjtimex|mprotect +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 130, 85, 84), //init_module|delete_module +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 150, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 138, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 136, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 134, 81, 80), //quotactl|getpgid|fchdir +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 137, 80, 79), //personality +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 143, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 141, 78, 77), //setfsuid|setfsgid|_llseek +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 149, 77, 76), //flock|msync|readv|writev|getsid|fdatasync +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 183, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 172, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 164, 74, 73), //mlock|munlock|mlockall|munlockall|sched_setparam|sched_getparam|sched_setscheduler|sched_getscheduler|sched_yield|sched_get_priority_max|sched_get_priority_min|sched_rr_get_interval|nanosleep|mremap +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 182, 73, 72), //prctl|rt_sigreturn|rt_sigaction|rt_sigprocmask|rt_sigpending|rt_sigtimedwait|rt_sigqueueinfo|rt_sigsuspend|pread64|pwrite64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 190, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 188, 71, 70), //getcwd|capget|capset|sigaltstack|sendfile +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 196, 70, 69), //vfork|ugetrlimit|mmap2|truncate64|ftruncate64|stat64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 345, 35, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 270, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 224, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 217, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 213, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 199, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 198, 63, 62), //fstat64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 212, 62, 61), //getuid32|getgid32|geteuid32|getegid32|setreuid32|setregid32|getgroups32|setgroups32|fchown32|setresuid32|getresuid32|setresgid32|getresgid32 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 215, 61, 60), //setuid32|setgid32 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 219, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 218, 59, 58), //getdents64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 222, 58, 57), //mincore|madvise|fcntl64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 251, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 241, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 240, 55, 54), //gettid|readahead|setxattr|lsetxattr|fsetxattr|getxattr|lgetxattr|fgetxattr|listxattr|llistxattr|flistxattr|removexattr|lremovexattr|fremovexattr|tkill|sendfile64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 249, 54, 53), //sched_setaffinity|sched_getaffinity|io_setup|io_destroy|io_getevents|io_submit|io_cancel|exit_group +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 256, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 252, 52, 51), //epoll_ctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 269, 51, 50), //set_tid_address|timer_create|timer_settime|timer_gettime|timer_getoverrun|timer_delete|clock_settime|clock_gettime|clock_getres|clock_nanosleep|statfs64|fstatfs64|tgkill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 317, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 290, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 286, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 280, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 271, 46, 45), //arm_fadvise64_64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 285, 45, 44), //waitid|socket|bind|connect|listen +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 289, 44, 43), //getsockname|getpeername|socketpair +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 292, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 291, 42, 41), //sendto +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 298, 41, 40), //recvfrom|shutdown|setsockopt|getsockopt|sendmsg|recvmsg +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 327, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 322, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 319, 38, 37), //inotify_add_watch|inotify_rm_watch +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 326, 37, 36), //openat|mkdirat|mknodat|fchownat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 340, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 339, 35, 34), //fstatat64|unlinkat|renameat|linkat|symlinkat|readlinkat|fchmodat|faccessat|pselect6|ppoll|unshare|set_robust_list +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 344, 34, 33), //splice|sync_file_range2|tee|vmsplice +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 417, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 372, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 352, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 350, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 348, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 347, 28, 27), //getcpu|epoll_pwait +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 349, 27, 26), //utimensat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 351, 26, 25), //timerfd_create +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 369, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 367, 24, 23), //fallocate|timerfd_settime|timerfd_gettime|signalfd4|eventfd2|epoll_create1|dup3|pipe2|inotify_init1|preadv|pwritev|rt_tgsigqueueinfo|perf_event_open|recvmmsg|accept4 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 370, 23, 22), //prlimit64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 397, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 380, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 378, 20, 19), //clock_adjtime|syncfs|sendmmsg|setns|process_vm_readv|process_vm_writev +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 394, 19, 18), //sched_setattr|sched_getattr|renameat2|seccomp|getrandom|memfd_create|bpf|execveat|userfaultfd|membarrier|mlock2|copy_file_range|preadv2|pwritev2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 403, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 398, 17, 16), //statx +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 415, 16, 15), //clock_gettime64|clock_settime64|clock_adjtime64|clock_getres_time64|clock_nanosleep_time64|timer_gettime64|timer_settime64|timerfd_gettime64|timerfd_settime64|utimensat_time64|pselect6_time64|ppoll_time64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 438, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 434, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 420, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 418, 12, 11), //recvmmsg_time64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 425, 11, 10), //semtimedop_time64|rt_sigtimedwait_time64|futex_time64|sched_rr_get_interval_time64|pidfd_send_signal +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 436, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 435, 9, 8), //pidfd_open +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 437, 8, 7), //close_range +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 983042, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 440, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 439, 5, 4), //pidfd_getfd +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 441, 4, 3), //process_madvise +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 983045, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 983043, 2, 1), //__ARM_NR_cacheflush +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 983046, 1, 0), //__ARM_NR_set_tls +BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), +}; + +#define arm_system_filter_size (sizeof(arm_system_filter) / sizeof(struct sock_filter)) diff --git a/executor/android/x86_64_system_policy.h b/executor/android/x86_64_system_policy.h new file mode 100644 index 000000000..2cbb79185 --- /dev/null +++ b/executor/android/x86_64_system_policy.h @@ -0,0 +1,110 @@ +// Copyright 2022 syzkaller project authors. All rights reserved. +// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. + +// File autogenerated by genseccomp.py from Android U - edit at your peril!! + +const sock_filter x86_64_system_filter[] = { +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 0, 0, 100), +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 202, 98, 0), //futex +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 16, 97, 0), //ioctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 203, 49, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 93, 25, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 44, 13, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 32, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 17, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 8, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 6, 91, 90), //read|write|open|close|stat|fstat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 16, 90, 89), //lseek|mmap|mprotect|munmap|brk|rt_sigaction|rt_sigprocmask|rt_sigreturn +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 24, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 21, 88, 87), //pread64|pwrite64|readv|writev +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 29, 87, 86), //sched_yield|mremap|msync|mincore|madvise +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 38, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 35, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 33, 84, 83), //dup +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 37, 83, 82), //nanosleep|getitimer +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 43, 82, 81), //setitimer|getpid|sendfile|socket|connect +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 79, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 72, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 58, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 57, 78, 77), //sendto|recvfrom|sendmsg|recvmsg|shutdown|bind|listen|getsockname|getpeername|socketpair|setsockopt|getsockopt|clone +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 64, 77, 76), //vfork|execve|exit|wait4|kill|uname +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 78, 76, 75), //fcntl|flock|fsync|fdatasync|truncate|ftruncate +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 91, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 89, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 82, 73, 72), //getcwd|chdir|fchdir +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 90, 72, 71), //readlink +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 92, 71, 70), //fchmod +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 155, 11, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 135, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 112, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 95, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 94, 66, 65), //fchown +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 111, 65, 64), //umask|gettimeofday|getrlimit|getrusage|sysinfo|times|ptrace|getuid|syslog|getgid|setuid|setgid|geteuid|getegid|setpgid|getppid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 132, 64, 63), //setsid|setreuid|setregid|getgroups|setgroups|setresuid|getresuid|setresgid|getresgid|getpgid|setfsuid|setfsgid|getsid|capget|capset|rt_sigpending|rt_sigtimedwait|rt_sigqueueinfo|rt_sigsuspend|sigaltstack +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 140, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 137, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 136, 61, 60), //personality +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 139, 60, 59), //statfs|fstatfs +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 153, 59, 58), //getpriority|setpriority|sched_setparam|sched_getparam|sched_setscheduler|sched_getscheduler|sched_get_priority_max|sched_get_priority_min|sched_rr_get_interval|mlock|munlock|mlockall|munlockall +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 175, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 169, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 157, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 156, 55, 54), //pivot_root +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 167, 54, 53), //prctl|arch_prctl|adjtimex|setrlimit|chroot|sync|acct|settimeofday|mount|umount2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 172, 53, 52), //reboot|sethostname|setdomainname +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 186, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 179, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 177, 50, 49), //init_module|delete_module +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 180, 49, 48), //quotactl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 201, 48, 47), //gettid|readahead|setxattr|lsetxattr|fsetxattr|getxattr|lgetxattr|fgetxattr|listxattr|llistxattr|flistxattr|removexattr|lremovexattr|fremovexattr|tkill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 283, 23, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 251, 11, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 221, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 217, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 206, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 205, 42, 41), //sched_setaffinity|sched_getaffinity +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 211, 41, 40), //io_setup|io_destroy|io_getevents|io_submit|io_cancel +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 220, 40, 39), //getdents64|set_tid_address|restart_syscall +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 247, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 233, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 232, 37, 36), //fadvise64|timer_create|timer_settime|timer_gettime|timer_getoverrun|timer_delete|clock_settime|clock_gettime|clock_getres|clock_nanosleep|exit_group +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 235, 36, 35), //epoll_ctl|tgkill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 248, 35, 34), //waitid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 262, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 257, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 254, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 253, 31, 30), //ioprio_set|ioprio_get +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 256, 30, 29), //inotify_add_watch|inotify_rm_watch +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 261, 29, 28), //openat|mkdirat|mknodat|fchownat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 280, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 275, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 274, 26, 25), //newfstatat|unlinkat|renameat|linkat|symlinkat|readlinkat|fchmodat|faccessat|pselect6|ppoll|unshare|set_robust_list +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 279, 25, 24), //splice|tee|sync_file_range|vmsplice +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 282, 24, 23), //utimensat|epoll_pwait +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 332, 11, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 305, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 302, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 285, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 284, 19, 18), //timerfd_create +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 300, 18, 17), //fallocate|timerfd_settime|timerfd_gettime|accept4|signalfd4|eventfd2|epoll_create1|dup3|pipe2|inotify_init1|preadv|pwritev|rt_tgsigqueueinfo|perf_event_open|recvmmsg +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 303, 17, 16), //prlimit64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 321, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 314, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 312, 14, 13), //clock_adjtime|syncfs|sendmmsg|setns|getcpu|process_vm_readv|process_vm_writev +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 320, 13, 12), //sched_setattr|sched_getattr|renameat2|seccomp|getrandom|memfd_create +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 329, 12, 11), //bpf|execveat|userfaultfd|membarrier|mlock2|copy_file_range|preadv2|pwritev2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 436, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 434, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 424, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 333, 8, 7), //statx +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 425, 7, 6), //pidfd_send_signal +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 435, 6, 5), //pidfd_open +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 440, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 438, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 437, 3, 2), //close_range +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 439, 2, 1), //pidfd_getfd +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 441, 1, 0), //process_madvise +BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), +}; + +#define x86_64_system_filter_size (sizeof(x86_64_system_filter) / sizeof(struct sock_filter)) diff --git a/executor/android/x86_system_policy.h b/executor/android/x86_system_policy.h new file mode 100644 index 000000000..bbaa09cce --- /dev/null +++ b/executor/android/x86_system_policy.h @@ -0,0 +1,146 @@ +// Copyright 2022 syzkaller project authors. All rights reserved. +// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. + +// File autogenerated by genseccomp.py from Android U - edit at your peril!! + +const struct sock_filter x86_system_filter[] = { +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 0, 0, 136), +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 240, 134, 0), //futex +BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 54, 133, 0), //ioctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 190, 67, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 88, 33, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 51, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 36, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 19, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 11, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 3, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 2, 126, 125), //restart_syscall|exit +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 7, 125, 124), //read|write|open|close +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 13, 124, 123), //execve|chdir +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 26, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 22, 122, 121), //lseek|getpid|mount +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 27, 121, 120), //ptrace +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 43, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 41, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 38, 118, 117), //sync|kill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 42, 117, 116), //dup +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 45, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 44, 115, 114), //times +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 46, 114, 113), //brk +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 66, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 60, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 57, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 53, 110, 109), //acct|umount2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 58, 109, 108), //setpgid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 64, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 62, 107, 106), //umask|chroot +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 65, 106, 105), //getppid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 77, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 74, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 68, 103, 102), //setsid|sigaction +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 76, 102, 101), //sethostname|setrlimit +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 85, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 80, 100, 99), //getrusage|gettimeofday|settimeofday +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 86, 99, 98), //readlink +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 128, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 114, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 96, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 94, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 91, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 89, 93, 92), //reboot +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 93, 92, 91), //munmap|truncate +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 95, 91, 90), //fchmod +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 102, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 98, 89, 88), //getpriority|setpriority +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 107, 88, 87), //socketcall|syslog|setitimer|getitimer|stat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 118, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 116, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 115, 85, 84), //wait4 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 117, 84, 83), //sysinfo +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 124, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 123, 82, 81), //fsync|sigreturn|clone|setdomainname|uname +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 126, 81, 80), //adjtimex|mprotect +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 143, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 136, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 131, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 130, 77, 76), //init_module|delete_module +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 134, 76, 75), //quotactl|getpgid|fchdir +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 138, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 137, 74, 73), //personality +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 141, 73, 72), //setfsuid|setfsgid|_llseek +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 172, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 150, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 149, 70, 69), //flock|msync|readv|writev|getsid|fdatasync +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 164, 69, 68), //mlock|munlock|mlockall|munlockall|sched_setparam|sched_getparam|sched_setscheduler|sched_getscheduler|sched_yield|sched_get_priority_max|sched_get_priority_min|sched_rr_get_interval|nanosleep|mremap +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 183, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 182, 67, 66), //prctl|rt_sigreturn|rt_sigaction|rt_sigprocmask|rt_sigpending|rt_sigtimedwait|rt_sigqueueinfo|rt_sigsuspend|pread64|pwrite64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 188, 66, 65), //getcwd|capget|capset|sigaltstack|sendfile +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 318, 33, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 255, 17, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 224, 9, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 213, 5, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 199, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 197, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 196, 59, 58), //vfork|ugetrlimit|mmap2|truncate64|ftruncate64|stat64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 198, 58, 57), //fstat64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 212, 57, 56), //getuid32|getgid32|geteuid32|getegid32|setreuid32|setregid32|getgroups32|setgroups32|fchown32|setresuid32|getresuid32|setresgid32|getresgid32 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 218, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 215, 55, 54), //setuid32|setgid32 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 222, 54, 53), //mincore|madvise|getdents64|fcntl64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 245, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 241, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 240, 51, 50), //gettid|readahead|setxattr|lsetxattr|fsetxattr|getxattr|lgetxattr|fgetxattr|listxattr|llistxattr|flistxattr|removexattr|lremovexattr|fremovexattr|tkill|sendfile64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 244, 50, 49), //sched_setaffinity|sched_getaffinity|set_thread_area +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 252, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 250, 48, 47), //io_setup|io_destroy|io_getevents|io_submit|io_cancel +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 253, 47, 46), //exit_group +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 292, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 272, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 258, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 256, 43, 42), //epoll_ctl +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 271, 42, 41), //set_tid_address|timer_create|timer_settime|timer_gettime|timer_getoverrun|timer_delete|clock_settime|clock_gettime|clock_getres|clock_nanosleep|statfs64|fstatfs64|tgkill +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 284, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 273, 40, 39), //fadvise64_64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 285, 39, 38), //waitid +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 300, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 295, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 294, 36, 35), //inotify_add_watch|inotify_rm_watch +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 299, 35, 34), //openat|mkdirat|mknodat|fchownat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 313, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 312, 33, 32), //fstatat64|unlinkat|renameat|linkat|symlinkat|readlinkat|fchmodat|faccessat|pselect6|ppoll|unshare|set_robust_list +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 317, 32, 31), //splice|sync_file_range|tee|vmsplice +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 383, 15, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 343, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 324, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 322, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 321, 27, 26), //getcpu|epoll_pwait|utimensat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 323, 26, 25), //timerfd_create +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 340, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 337, 24, 23), //fallocate|timerfd_settime|timerfd_gettime|signalfd4|eventfd2|epoll_create1|dup3|pipe2|inotify_init1|preadv|pwritev|rt_tgsigqueueinfo|perf_event_open +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 341, 23, 22), //prlimit64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 351, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 346, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 345, 20, 19), //clock_adjtime|syncfs +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 349, 19, 18), //setns|process_vm_readv|process_vm_writev +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 374, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 359, 17, 16), //sched_setattr|sched_getattr|renameat2|seccomp|getrandom|memfd_create|bpf|execveat +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 380, 16, 15), //userfaultfd|membarrier|mlock2|copy_file_range|preadv2|pwritev2 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 434, 7, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 417, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 403, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 384, 12, 11), //statx +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 415, 11, 10), //clock_gettime64|clock_settime64|clock_adjtime64|clock_getres_time64|clock_nanosleep_time64|timer_gettime64|timer_settime64|timerfd_gettime64|timerfd_settime64|utimensat_time64|pselect6_time64|ppoll_time64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 420, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 418, 9, 8), //recvmmsg_time64 +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 425, 8, 7), //semtimedop_time64|rt_sigtimedwait_time64|futex_time64|sched_rr_get_interval_time64|pidfd_send_signal +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 438, 3, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 436, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 435, 5, 4), //pidfd_open +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 437, 4, 3), //close_range +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 440, 1, 0), +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 439, 2, 1), //pidfd_getfd +BPF_JUMP(BPF_JMP|BPF_JGE|BPF_K, 441, 1, 0), //process_madvise +BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW), +}; + +#define x86_system_filter_size (sizeof(x86_system_filter) / sizeof(struct sock_filter)) |
