rustfoundry 4.2.0

A Rust service rustfoundry library.
Documentation
//! Predefined allow lists of syscalls for commonly used operations.

use super::{allow_list, sys, ArgCmp};

allow_list! {
    /// An allow list for basic tokio and Rust std library operations.
    pub static RUST_BASICS = [
        sigaltstack,
        getrandom,
        clone, // threads/rayon
        clone3, // since Rust 1.56.0
        futex,
        sched_yield,
        set_robust_list,
        sched_getaffinity,
        madvise, // memory allocation
        mprotect,
        // NOTE: rust 1.80.0 std library introduced an assertion that uses `fcntl`:
        // https://github.com/rust-lang/rust/commit/38ded129236f112a7421f311aeb8ca750b661443
        // it's later has been changed to debug-only assertion:
        // https://github.com/rust-lang/rust/commit/1ba00d9cb2fcfef464b6a188fa3a7543c66eecaa,
        // so we allow this syscall only in debug mode.
        #[cfg(debug_assertions)]
        fcntl,
        prctl if [ ArgCmp::Equal { arg_idx: 0, value: sys::PR_SET_NAME.into() } ], // tokio-runtime thread name
        prctl if [ ArgCmp::Equal { arg_idx: 0, value: sys::PR_GET_SECCOMP.into() } ] // used for security::get_current_thread_seccomp_mode
    ]
}

allow_list! {
    /// An allow list for basic service process operations.
    pub static SERVICE_BASICS = [
        ..RUST_BASICS,
        exit,
        exit_group,
        kill if [ ArgCmp::Equal { arg_idx: 0, value: std::process::id().into() } ],
        tgkill if [ ArgCmp::Equal { arg_idx: 0, value: std::process::id().into() } ],
        getpid,
        gettid,
        rt_sigprocmask,
        read,
        write,
        close,
        brk,
        mmap,
        munmap,
        mremap,
        fstat,
        statx,
        #[cfg(target_arch = "x86_64")]
        stat,
        #[cfg(target_arch = "x86_64")]
        lstat,
        newfstatat,
        lseek,
        rseq
    ]
}

allow_list! {
    /// An allow list for syscalls that are usually required by [epoll]-based async code.
    ///
    /// [epoll]: https://man7.org/linux/man-pages/man7/epoll.7.html
    pub static ASYNC = [
        #[cfg(target_arch = "x86_64")]
        epoll_wait,
        epoll_pwait,
        epoll_ctl,
        #[cfg(target_arch = "x86_64")]
        epoll_create,
        epoll_create1
    ]
}

allow_list! {
    /// An allow list for network socket API.
    ///
    /// Note that this allow list doesn't allow creation of new network endpoints
    /// (e.g. by using [`Syscall::listen`]).
    ///
    /// [`Syscall::listen`]: super::Syscall::listen
    pub static NET_SOCKET_API = [
        socket,
        connect,
        shutdown,
        accept,
        accept4,
        sendto,
        sendmsg,
        sendmmsg,
        recvfrom,
        recvmsg,
        recvmmsg,
        socketpair,
        setsockopt,
        getsockopt,
        getsockname,
        bind,
        ioctl
    ]
}

allow_list! {
    /// An allow list for [inotify]-based FS watch API.
    ///
    /// [inotify]: https://man7.org/linux/man-pages/man7/inotify.7.html
    pub static FS_WATCH = [
        #[cfg(target_arch = "x86_64")]
        inotify_init,
        inotify_init1,
        inotify_add_watch,
        inotify_rm_watch,
        getdents64
    ]
}

allow_list! {
    /// An allow list for the [vectored IO operations].
    ///
    /// [vectored IO operations]: https://lwn.net/Articles/170954/
    pub static VECTORED_IO = [
        readv,
        writev,
        preadv,
        pwritev
    ]
}

allow_list! {
    /// An allow list of extra operations required for panic reporting by [Sentry].
    ///
    /// Usually used in combination with [`SERVICE_BASICS`] if Sentry is enabled.
    ///
    /// [Sentry]: https://sentry.io/
    pub static SENTRY_EXTRAS = [
        #[cfg(target_arch = "x86_64")]
        readlink,
        uname
    ]
}