tree: 3b4279d4879ef91ba73c416e11e91fb98ab68b99 [path history] [tgz]
  1. bio-crypto-init-seccomp-amd64.policy
  2. bio-crypto-init-seccomp-arm.policy
  3. bio-crypto-init-seccomp-arm64.policy
  4. biod-seccomp-amd64.policy
  5. biod-seccomp-arm.policy
  6. biod-seccomp-arm64.policy
  7. README.md
  8. run_bio_crypto_init_strace.sh
  9. run_biod_strace.sh
biod/init/seccomp/README.md

Generating Seccomp Policies

The seccomp policies are effectively an allow-list of syscalls and their arguments that a program is allowed to issue. The general idea to creating a starter policy is to run the program with strace and log the system calls that the kernel saw. This is a tough job, since there is no guarantee that you can exercise all code paths and error cases, where additional system calls may present themselves.

See Sandboxing Chrome OS system services for more information.

Quick Start

See comments in run_bio_crypto_init_strace.sh and run_biod_strace.sh.

Tips

Starting in kernel 4.14, CROS_EC_DEV_IOC* symbolic names refer to the EC V2 protocol. These commands appear as CROS_EC_DEV_IOC*_V2 in the EC codebase. See the following: