|
@@ -0,0 +1,80 @@
|
|
|
+/*
|
|
|
+ Copyright The containerd Authors.
|
|
|
+
|
|
|
+ Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+ you may not use this file except in compliance with the License.
|
|
|
+ You may obtain a copy of the License at
|
|
|
+
|
|
|
+ http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+
|
|
|
+ Unless required by applicable law or agreed to in writing, software
|
|
|
+ distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ See the License for the specific language governing permissions and
|
|
|
+ limitations under the License.
|
|
|
+*/
|
|
|
+
|
|
|
+/*
|
|
|
+ Copyright The runc Authors.
|
|
|
+
|
|
|
+ Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+ you may not use this file except in compliance with the License.
|
|
|
+ You may obtain a copy of the License at
|
|
|
+
|
|
|
+ http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+
|
|
|
+ Unless required by applicable law or agreed to in writing, software
|
|
|
+ distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ See the License for the specific language governing permissions and
|
|
|
+ limitations under the License.
|
|
|
+*/
|
|
|
+
|
|
|
+package seccomp
|
|
|
+
|
|
|
+import (
|
|
|
+ "sync"
|
|
|
+
|
|
|
+ "golang.org/x/sys/unix"
|
|
|
+)
|
|
|
+
|
|
|
+var (
|
|
|
+ enabled bool
|
|
|
+ enabledOnce sync.Once
|
|
|
+)
|
|
|
+
|
|
|
+// isEnabled returns whether the kernel has been configured to support seccomp
|
|
|
+// (including the check for CONFIG_SECCOMP_FILTER kernel option).
|
|
|
+func isEnabled() bool {
|
|
|
+ // Excerpts from prctl(2), section ERRORS:
|
|
|
+ //
|
|
|
+ // EACCES
|
|
|
+ // option is PR_SET_SECCOMP and arg2 is SECCOMP_MODE_FILTER, but
|
|
|
+ // the process does not have the CAP_SYS_ADMIN capability or has
|
|
|
+ // not set the no_new_privs attribute <...>.
|
|
|
+ // <...>
|
|
|
+ // EFAULT
|
|
|
+ // option is PR_SET_SECCOMP, arg2 is SECCOMP_MODE_FILTER, the
|
|
|
+ // system was built with CONFIG_SECCOMP_FILTER, and arg3 is an
|
|
|
+ // invalid address.
|
|
|
+ // <...>
|
|
|
+ // EINVAL
|
|
|
+ // option is PR_SET_SECCOMP or PR_GET_SECCOMP, and the kernel
|
|
|
+ // was not configured with CONFIG_SECCOMP.
|
|
|
+ //
|
|
|
+ // EINVAL
|
|
|
+ // option is PR_SET_SECCOMP, arg2 is SECCOMP_MODE_FILTER,
|
|
|
+ // and the kernel was not configured with CONFIG_SECCOMP_FILTER.
|
|
|
+ // <end of quote>
|
|
|
+ //
|
|
|
+ // Meaning, in case these kernel options are set (this is what we check
|
|
|
+ // for here), we will get some other error (most probably EACCES or
|
|
|
+ // EFAULT). IOW, EINVAL means "seccomp not supported", any other error
|
|
|
+ // means it is supported.
|
|
|
+
|
|
|
+ enabledOnce.Do(func() {
|
|
|
+ enabled = unix.Prctl(unix.PR_SET_SECCOMP, unix.SECCOMP_MODE_FILTER, 0, 0, 0) != unix.EINVAL
|
|
|
+ })
|
|
|
+
|
|
|
+ return enabled
|
|
|
+}
|