mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	This updates vendored runc/libcontainer to 1.1.0, and google/cadvisor to a version updated to runc 1.1.0 (google/cadvisor#3048). Changes in vendor are generated by (roughly): ./hack/pin-dependency.sh github.com/google/cadvisor v0.44.0 ./hack/pin-dependency.sh github.com/opencontainers/runc v1.1.0 ./hack/update-vendor.sh ./hack/lint-dependencies.sh # And follow all its recommendations. ./hack/update-vendor.sh ./hack/update-internal-modules.sh ./hack/lint-dependencies.sh # Re-check everything again. Co-Authored-By: Kir Kolyshkin <kolyshkin@gmail.com>
		
			
				
	
	
		
			855 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			855 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build linux
 | |
| 
 | |
| // Internal functions for libseccomp Go bindings
 | |
| // No exported functions
 | |
| 
 | |
| package seccomp
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"syscall"
 | |
| )
 | |
| 
 | |
| // Unexported C wrapping code - provides the C-Golang interface
 | |
| // Get the seccomp header in scope
 | |
| // Need stdlib.h for free() on cstrings
 | |
| 
 | |
| // To compile libseccomp-golang against a specific version of libseccomp:
 | |
| // cd ../libseccomp && mkdir -p prefix
 | |
| // ./configure --prefix=$PWD/prefix && make && make install
 | |
| // cd ../libseccomp-golang
 | |
| // PKG_CONFIG_PATH=$PWD/../libseccomp/prefix/lib/pkgconfig/ make
 | |
| // LD_PRELOAD=$PWD/../libseccomp/prefix/lib/libseccomp.so.2.5.0 PKG_CONFIG_PATH=$PWD/../libseccomp/prefix/lib/pkgconfig/ make test
 | |
| 
 | |
| // #cgo pkg-config: libseccomp
 | |
| /*
 | |
| #include <errno.h>
 | |
| #include <stdlib.h>
 | |
| #include <seccomp.h>
 | |
| 
 | |
| #if SCMP_VER_MAJOR < 2
 | |
| #error Minimum supported version of Libseccomp is v2.2.0
 | |
| #elif SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 2
 | |
| #error Minimum supported version of Libseccomp is v2.2.0
 | |
| #endif
 | |
| 
 | |
| #define ARCH_BAD ~0
 | |
| 
 | |
| const uint32_t C_ARCH_BAD = ARCH_BAD;
 | |
| 
 | |
| #ifndef SCMP_ARCH_PPC
 | |
| #define SCMP_ARCH_PPC ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_PPC64
 | |
| #define SCMP_ARCH_PPC64 ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_PPC64LE
 | |
| #define SCMP_ARCH_PPC64LE ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_S390
 | |
| #define SCMP_ARCH_S390 ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_S390X
 | |
| #define SCMP_ARCH_S390X ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_PARISC
 | |
| #define SCMP_ARCH_PARISC ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ARCH_PARISC64
 | |
| #define SCMP_ARCH_PARISC64 ARCH_BAD
 | |
| #endif
 | |
| 
 | |
| const uint32_t C_ARCH_NATIVE       = SCMP_ARCH_NATIVE;
 | |
| const uint32_t C_ARCH_X86          = SCMP_ARCH_X86;
 | |
| const uint32_t C_ARCH_X86_64       = SCMP_ARCH_X86_64;
 | |
| const uint32_t C_ARCH_X32          = SCMP_ARCH_X32;
 | |
| const uint32_t C_ARCH_ARM          = SCMP_ARCH_ARM;
 | |
| const uint32_t C_ARCH_AARCH64      = SCMP_ARCH_AARCH64;
 | |
| const uint32_t C_ARCH_MIPS         = SCMP_ARCH_MIPS;
 | |
| const uint32_t C_ARCH_MIPS64       = SCMP_ARCH_MIPS64;
 | |
| const uint32_t C_ARCH_MIPS64N32    = SCMP_ARCH_MIPS64N32;
 | |
| const uint32_t C_ARCH_MIPSEL       = SCMP_ARCH_MIPSEL;
 | |
| const uint32_t C_ARCH_MIPSEL64     = SCMP_ARCH_MIPSEL64;
 | |
| const uint32_t C_ARCH_MIPSEL64N32  = SCMP_ARCH_MIPSEL64N32;
 | |
| const uint32_t C_ARCH_PPC          = SCMP_ARCH_PPC;
 | |
| const uint32_t C_ARCH_PPC64        = SCMP_ARCH_PPC64;
 | |
| const uint32_t C_ARCH_PPC64LE      = SCMP_ARCH_PPC64LE;
 | |
| const uint32_t C_ARCH_S390         = SCMP_ARCH_S390;
 | |
| const uint32_t C_ARCH_S390X        = SCMP_ARCH_S390X;
 | |
| const uint32_t C_ARCH_PARISC       = SCMP_ARCH_PARISC;
 | |
| const uint32_t C_ARCH_PARISC64     = SCMP_ARCH_PARISC64;
 | |
| 
 | |
| #ifndef SCMP_ACT_LOG
 | |
| #define SCMP_ACT_LOG 0x7ffc0000U
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ACT_KILL_PROCESS
 | |
| #define SCMP_ACT_KILL_PROCESS 0x80000000U
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ACT_KILL_THREAD
 | |
| #define SCMP_ACT_KILL_THREAD	0x00000000U
 | |
| #endif
 | |
| 
 | |
| #ifndef SCMP_ACT_NOTIFY
 | |
| #define SCMP_ACT_NOTIFY 0x7fc00000U
 | |
| #endif
 | |
| 
 | |
| const uint32_t C_ACT_KILL          = SCMP_ACT_KILL;
 | |
| const uint32_t C_ACT_KILL_PROCESS  = SCMP_ACT_KILL_PROCESS;
 | |
| const uint32_t C_ACT_KILL_THREAD   = SCMP_ACT_KILL_THREAD;
 | |
| const uint32_t C_ACT_TRAP          = SCMP_ACT_TRAP;
 | |
| const uint32_t C_ACT_ERRNO         = SCMP_ACT_ERRNO(0);
 | |
| const uint32_t C_ACT_TRACE         = SCMP_ACT_TRACE(0);
 | |
| const uint32_t C_ACT_LOG           = SCMP_ACT_LOG;
 | |
| const uint32_t C_ACT_ALLOW         = SCMP_ACT_ALLOW;
 | |
| const uint32_t C_ACT_NOTIFY        = SCMP_ACT_NOTIFY;
 | |
| 
 | |
| // The libseccomp SCMP_FLTATR_CTL_LOG member of the scmp_filter_attr enum was
 | |
| // added in v2.4.0
 | |
| #if (SCMP_VER_MAJOR < 2) || \
 | |
|     (SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 4)
 | |
| #define SCMP_FLTATR_CTL_LOG _SCMP_FLTATR_MIN
 | |
| #endif
 | |
| #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 5
 | |
| #define SCMP_FLTATR_CTL_SSB _SCMP_FLTATR_MIN
 | |
| #endif
 | |
| 
 | |
| const uint32_t C_ATTRIBUTE_DEFAULT = (uint32_t)SCMP_FLTATR_ACT_DEFAULT;
 | |
| const uint32_t C_ATTRIBUTE_BADARCH = (uint32_t)SCMP_FLTATR_ACT_BADARCH;
 | |
| const uint32_t C_ATTRIBUTE_NNP     = (uint32_t)SCMP_FLTATR_CTL_NNP;
 | |
| const uint32_t C_ATTRIBUTE_TSYNC   = (uint32_t)SCMP_FLTATR_CTL_TSYNC;
 | |
| const uint32_t C_ATTRIBUTE_LOG     = (uint32_t)SCMP_FLTATR_CTL_LOG;
 | |
| const uint32_t C_ATTRIBUTE_SSB     = (uint32_t)SCMP_FLTATR_CTL_SSB;
 | |
| 
 | |
| const int      C_CMP_NE            = (int)SCMP_CMP_NE;
 | |
| const int      C_CMP_LT            = (int)SCMP_CMP_LT;
 | |
| const int      C_CMP_LE            = (int)SCMP_CMP_LE;
 | |
| const int      C_CMP_EQ            = (int)SCMP_CMP_EQ;
 | |
| const int      C_CMP_GE            = (int)SCMP_CMP_GE;
 | |
| const int      C_CMP_GT            = (int)SCMP_CMP_GT;
 | |
| const int      C_CMP_MASKED_EQ     = (int)SCMP_CMP_MASKED_EQ;
 | |
| 
 | |
| const int      C_VERSION_MAJOR     = SCMP_VER_MAJOR;
 | |
| const int      C_VERSION_MINOR     = SCMP_VER_MINOR;
 | |
| const int      C_VERSION_MICRO     = SCMP_VER_MICRO;
 | |
| 
 | |
| #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR >= 3
 | |
| unsigned int get_major_version()
 | |
| {
 | |
|         return seccomp_version()->major;
 | |
| }
 | |
| 
 | |
| unsigned int get_minor_version()
 | |
| {
 | |
|         return seccomp_version()->minor;
 | |
| }
 | |
| 
 | |
| unsigned int get_micro_version()
 | |
| {
 | |
|         return seccomp_version()->micro;
 | |
| }
 | |
| #else
 | |
| unsigned int get_major_version()
 | |
| {
 | |
|         return (unsigned int)C_VERSION_MAJOR;
 | |
| }
 | |
| 
 | |
| unsigned int get_minor_version()
 | |
| {
 | |
|         return (unsigned int)C_VERSION_MINOR;
 | |
| }
 | |
| 
 | |
| unsigned int get_micro_version()
 | |
| {
 | |
|         return (unsigned int)C_VERSION_MICRO;
 | |
| }
 | |
| #endif
 | |
| 
 | |
| // The libseccomp API level functions were added in v2.4.0
 | |
| #if (SCMP_VER_MAJOR < 2) || \
 | |
|     (SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 4)
 | |
| const unsigned int seccomp_api_get(void)
 | |
| {
 | |
| 	// libseccomp-golang requires libseccomp v2.2.0, at a minimum, which
 | |
| 	// supported API level 2. However, the kernel may not support API level
 | |
| 	// 2 constructs which are the seccomp() system call and the TSYNC
 | |
| 	// filter flag. Return the "reserved" value of 0 here to indicate that
 | |
| 	// proper API level support is not available in libseccomp.
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| int seccomp_api_set(unsigned int level)
 | |
| {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| #endif
 | |
| 
 | |
| typedef struct scmp_arg_cmp* scmp_cast_t;
 | |
| 
 | |
| void* make_arg_cmp_array(unsigned int length)
 | |
| {
 | |
|         return calloc(length, sizeof(struct scmp_arg_cmp));
 | |
| }
 | |
| 
 | |
| // Wrapper to add an scmp_arg_cmp struct to an existing arg_cmp array
 | |
| void add_struct_arg_cmp(
 | |
|                         struct scmp_arg_cmp* arr,
 | |
|                         unsigned int pos,
 | |
|                         unsigned int arg,
 | |
|                         int compare,
 | |
|                         uint64_t a,
 | |
|                         uint64_t b
 | |
|                        )
 | |
| {
 | |
|         arr[pos].arg = arg;
 | |
|         arr[pos].op = compare;
 | |
|         arr[pos].datum_a = a;
 | |
|         arr[pos].datum_b = b;
 | |
| 
 | |
|         return;
 | |
| }
 | |
| 
 | |
| // The seccomp notify API functions were added in v2.5.0
 | |
| #if (SCMP_VER_MAJOR < 2) || \
 | |
|     (SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 5)
 | |
| 
 | |
| struct seccomp_data {
 | |
| 	int nr;
 | |
| 	__u32 arch;
 | |
| 	__u64 instruction_pointer;
 | |
| 	__u64 args[6];
 | |
| };
 | |
| 
 | |
| struct seccomp_notif {
 | |
| 	__u64 id;
 | |
| 	__u32 pid;
 | |
| 	__u32 flags;
 | |
| 	struct seccomp_data data;
 | |
| };
 | |
| 
 | |
| struct seccomp_notif_resp {
 | |
| 	__u64 id;
 | |
| 	__s64 val;
 | |
| 	__s32 error;
 | |
| 	__u32 flags;
 | |
| };
 | |
| 
 | |
| int seccomp_notify_alloc(struct seccomp_notif **req, struct seccomp_notif_resp **resp) {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| int seccomp_notify_fd(const scmp_filter_ctx ctx) {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| void seccomp_notify_free(struct seccomp_notif *req, struct seccomp_notif_resp *resp) {
 | |
| }
 | |
| int seccomp_notify_id_valid(int fd, uint64_t id) {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| int seccomp_notify_receive(int fd, struct seccomp_notif *req) {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| int seccomp_notify_respond(int fd, struct seccomp_notif_resp *resp) {
 | |
| 	return -EOPNOTSUPP;
 | |
| }
 | |
| 
 | |
| #endif
 | |
| */
 | |
| import "C"
 | |
| 
 | |
| // Nonexported types
 | |
| type scmpFilterAttr uint32
 | |
| 
 | |
| // Nonexported constants
 | |
| 
 | |
| const (
 | |
| 	filterAttrActDefault scmpFilterAttr = iota
 | |
| 	filterAttrActBadArch scmpFilterAttr = iota
 | |
| 	filterAttrNNP        scmpFilterAttr = iota
 | |
| 	filterAttrTsync      scmpFilterAttr = iota
 | |
| 	filterAttrLog        scmpFilterAttr = iota
 | |
| 	filterAttrSSB        scmpFilterAttr = iota
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	// An error return from certain libseccomp functions
 | |
| 	scmpError C.int = -1
 | |
| 	// Comparison boundaries to check for architecture validity
 | |
| 	archStart ScmpArch = ArchNative
 | |
| 	archEnd   ScmpArch = ArchPARISC64
 | |
| 	// Comparison boundaries to check for action validity
 | |
| 	actionStart ScmpAction = ActKill
 | |
| 	actionEnd   ScmpAction = ActKillProcess
 | |
| 	// Comparison boundaries to check for comparison operator validity
 | |
| 	compareOpStart ScmpCompareOp = CompareNotEqual
 | |
| 	compareOpEnd   ScmpCompareOp = CompareMaskedEqual
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	// Error thrown on bad filter context
 | |
| 	errBadFilter = fmt.Errorf("filter is invalid or uninitialized")
 | |
| 	// Constants representing library major, minor, and micro versions
 | |
| 	verMajor = uint(C.get_major_version())
 | |
| 	verMinor = uint(C.get_minor_version())
 | |
| 	verMicro = uint(C.get_micro_version())
 | |
| )
 | |
| 
 | |
| // Nonexported functions
 | |
| 
 | |
| // Check if library version is greater than or equal to the given one
 | |
| func checkVersionAbove(major, minor, micro uint) bool {
 | |
| 	return (verMajor > major) ||
 | |
| 		(verMajor == major && verMinor > minor) ||
 | |
| 		(verMajor == major && verMinor == minor && verMicro >= micro)
 | |
| }
 | |
| 
 | |
| // Ensure that the library is supported, i.e. >= 2.2.0.
 | |
| func ensureSupportedVersion() error {
 | |
| 	if !checkVersionAbove(2, 2, 0) {
 | |
| 		return VersionError{}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Get the API level
 | |
| func getAPI() (uint, error) {
 | |
| 	api := C.seccomp_api_get()
 | |
| 	if api == 0 {
 | |
| 		return 0, fmt.Errorf("API level operations are not supported")
 | |
| 	}
 | |
| 
 | |
| 	return uint(api), nil
 | |
| }
 | |
| 
 | |
| // Set the API level
 | |
| func setAPI(api uint) error {
 | |
| 	if retCode := C.seccomp_api_set(C.uint(api)); retCode != 0 {
 | |
| 		if errRc(retCode) == syscall.EOPNOTSUPP {
 | |
| 			return fmt.Errorf("API level operations are not supported")
 | |
| 		}
 | |
| 
 | |
| 		return fmt.Errorf("could not set API level: %v", retCode)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Filter helpers
 | |
| 
 | |
| // Filter finalizer - ensure that kernel context for filters is freed
 | |
| func filterFinalizer(f *ScmpFilter) {
 | |
| 	f.Release()
 | |
| }
 | |
| 
 | |
| func errRc(rc C.int) error {
 | |
| 	return syscall.Errno(-1 * rc)
 | |
| }
 | |
| 
 | |
| // Get a raw filter attribute
 | |
| func (f *ScmpFilter) getFilterAttr(attr scmpFilterAttr) (C.uint32_t, error) {
 | |
| 	f.lock.Lock()
 | |
| 	defer f.lock.Unlock()
 | |
| 
 | |
| 	if !f.valid {
 | |
| 		return 0x0, errBadFilter
 | |
| 	}
 | |
| 
 | |
| 	var attribute C.uint32_t
 | |
| 
 | |
| 	retCode := C.seccomp_attr_get(f.filterCtx, attr.toNative(), &attribute)
 | |
| 	if retCode != 0 {
 | |
| 		return 0x0, errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	return attribute, nil
 | |
| }
 | |
| 
 | |
| // Set a raw filter attribute
 | |
| func (f *ScmpFilter) setFilterAttr(attr scmpFilterAttr, value C.uint32_t) error {
 | |
| 	f.lock.Lock()
 | |
| 	defer f.lock.Unlock()
 | |
| 
 | |
| 	if !f.valid {
 | |
| 		return errBadFilter
 | |
| 	}
 | |
| 
 | |
| 	retCode := C.seccomp_attr_set(f.filterCtx, attr.toNative(), value)
 | |
| 	if retCode != 0 {
 | |
| 		return errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // DOES NOT LOCK OR CHECK VALIDITY
 | |
| // Assumes caller has already done this
 | |
| // Wrapper for seccomp_rule_add_... functions
 | |
| func (f *ScmpFilter) addRuleWrapper(call ScmpSyscall, action ScmpAction, exact bool, length C.uint, cond C.scmp_cast_t) error {
 | |
| 	if length != 0 && cond == nil {
 | |
| 		return fmt.Errorf("null conditions list, but length is nonzero")
 | |
| 	}
 | |
| 
 | |
| 	var retCode C.int
 | |
| 	if exact {
 | |
| 		retCode = C.seccomp_rule_add_exact_array(f.filterCtx, action.toNative(), C.int(call), length, cond)
 | |
| 	} else {
 | |
| 		retCode = C.seccomp_rule_add_array(f.filterCtx, action.toNative(), C.int(call), length, cond)
 | |
| 	}
 | |
| 
 | |
| 	if retCode != 0 {
 | |
| 		switch e := errRc(retCode); e {
 | |
| 		case syscall.EFAULT:
 | |
| 			return fmt.Errorf("unrecognized syscall %#x", int32(call))
 | |
| 		case syscall.EPERM:
 | |
| 			return fmt.Errorf("requested action matches default action of filter")
 | |
| 		case syscall.EINVAL:
 | |
| 			return fmt.Errorf("two checks on same syscall argument")
 | |
| 		default:
 | |
| 			return e
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Generic add function for filter rules
 | |
| func (f *ScmpFilter) addRuleGeneric(call ScmpSyscall, action ScmpAction, exact bool, conds []ScmpCondition) error {
 | |
| 	f.lock.Lock()
 | |
| 	defer f.lock.Unlock()
 | |
| 
 | |
| 	if !f.valid {
 | |
| 		return errBadFilter
 | |
| 	}
 | |
| 
 | |
| 	if len(conds) == 0 {
 | |
| 		if err := f.addRuleWrapper(call, action, exact, 0, nil); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	} else {
 | |
| 		// We don't support conditional filtering in library version v2.1
 | |
| 		if !checkVersionAbove(2, 2, 1) {
 | |
| 			return VersionError{
 | |
| 				message: "conditional filtering is not supported",
 | |
| 				minimum: "2.2.1",
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		argsArr := C.make_arg_cmp_array(C.uint(len(conds)))
 | |
| 		if argsArr == nil {
 | |
| 			return fmt.Errorf("error allocating memory for conditions")
 | |
| 		}
 | |
| 		defer C.free(argsArr)
 | |
| 
 | |
| 		for i, cond := range conds {
 | |
| 			C.add_struct_arg_cmp(C.scmp_cast_t(argsArr), C.uint(i),
 | |
| 				C.uint(cond.Argument), cond.Op.toNative(),
 | |
| 				C.uint64_t(cond.Operand1), C.uint64_t(cond.Operand2))
 | |
| 		}
 | |
| 
 | |
| 		if err := f.addRuleWrapper(call, action, exact, C.uint(len(conds)), C.scmp_cast_t(argsArr)); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Generic Helpers
 | |
| 
 | |
| // Helper - Sanitize Arch token input
 | |
| func sanitizeArch(in ScmpArch) error {
 | |
| 	if in < archStart || in > archEnd {
 | |
| 		return fmt.Errorf("unrecognized architecture %#x", uint(in))
 | |
| 	}
 | |
| 
 | |
| 	if in.toNative() == C.C_ARCH_BAD {
 | |
| 		return fmt.Errorf("architecture %v is not supported on this version of the library", in)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func sanitizeAction(in ScmpAction) error {
 | |
| 	inTmp := in & 0x0000FFFF
 | |
| 	if inTmp < actionStart || inTmp > actionEnd {
 | |
| 		return fmt.Errorf("unrecognized action %#x", uint(inTmp))
 | |
| 	}
 | |
| 
 | |
| 	if inTmp != ActTrace && inTmp != ActErrno && (in&0xFFFF0000) != 0 {
 | |
| 		return fmt.Errorf("highest 16 bits must be zeroed except for Trace and Errno")
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func sanitizeCompareOp(in ScmpCompareOp) error {
 | |
| 	if in < compareOpStart || in > compareOpEnd {
 | |
| 		return fmt.Errorf("unrecognized comparison operator %#x", uint(in))
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func archFromNative(a C.uint32_t) (ScmpArch, error) {
 | |
| 	switch a {
 | |
| 	case C.C_ARCH_X86:
 | |
| 		return ArchX86, nil
 | |
| 	case C.C_ARCH_X86_64:
 | |
| 		return ArchAMD64, nil
 | |
| 	case C.C_ARCH_X32:
 | |
| 		return ArchX32, nil
 | |
| 	case C.C_ARCH_ARM:
 | |
| 		return ArchARM, nil
 | |
| 	case C.C_ARCH_NATIVE:
 | |
| 		return ArchNative, nil
 | |
| 	case C.C_ARCH_AARCH64:
 | |
| 		return ArchARM64, nil
 | |
| 	case C.C_ARCH_MIPS:
 | |
| 		return ArchMIPS, nil
 | |
| 	case C.C_ARCH_MIPS64:
 | |
| 		return ArchMIPS64, nil
 | |
| 	case C.C_ARCH_MIPS64N32:
 | |
| 		return ArchMIPS64N32, nil
 | |
| 	case C.C_ARCH_MIPSEL:
 | |
| 		return ArchMIPSEL, nil
 | |
| 	case C.C_ARCH_MIPSEL64:
 | |
| 		return ArchMIPSEL64, nil
 | |
| 	case C.C_ARCH_MIPSEL64N32:
 | |
| 		return ArchMIPSEL64N32, nil
 | |
| 	case C.C_ARCH_PPC:
 | |
| 		return ArchPPC, nil
 | |
| 	case C.C_ARCH_PPC64:
 | |
| 		return ArchPPC64, nil
 | |
| 	case C.C_ARCH_PPC64LE:
 | |
| 		return ArchPPC64LE, nil
 | |
| 	case C.C_ARCH_S390:
 | |
| 		return ArchS390, nil
 | |
| 	case C.C_ARCH_S390X:
 | |
| 		return ArchS390X, nil
 | |
| 	case C.C_ARCH_PARISC:
 | |
| 		return ArchPARISC, nil
 | |
| 	case C.C_ARCH_PARISC64:
 | |
| 		return ArchPARISC64, nil
 | |
| 	default:
 | |
| 		return 0x0, fmt.Errorf("unrecognized architecture %#x", uint32(a))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Only use with sanitized arches, no error handling
 | |
| func (a ScmpArch) toNative() C.uint32_t {
 | |
| 	switch a {
 | |
| 	case ArchX86:
 | |
| 		return C.C_ARCH_X86
 | |
| 	case ArchAMD64:
 | |
| 		return C.C_ARCH_X86_64
 | |
| 	case ArchX32:
 | |
| 		return C.C_ARCH_X32
 | |
| 	case ArchARM:
 | |
| 		return C.C_ARCH_ARM
 | |
| 	case ArchARM64:
 | |
| 		return C.C_ARCH_AARCH64
 | |
| 	case ArchMIPS:
 | |
| 		return C.C_ARCH_MIPS
 | |
| 	case ArchMIPS64:
 | |
| 		return C.C_ARCH_MIPS64
 | |
| 	case ArchMIPS64N32:
 | |
| 		return C.C_ARCH_MIPS64N32
 | |
| 	case ArchMIPSEL:
 | |
| 		return C.C_ARCH_MIPSEL
 | |
| 	case ArchMIPSEL64:
 | |
| 		return C.C_ARCH_MIPSEL64
 | |
| 	case ArchMIPSEL64N32:
 | |
| 		return C.C_ARCH_MIPSEL64N32
 | |
| 	case ArchPPC:
 | |
| 		return C.C_ARCH_PPC
 | |
| 	case ArchPPC64:
 | |
| 		return C.C_ARCH_PPC64
 | |
| 	case ArchPPC64LE:
 | |
| 		return C.C_ARCH_PPC64LE
 | |
| 	case ArchS390:
 | |
| 		return C.C_ARCH_S390
 | |
| 	case ArchS390X:
 | |
| 		return C.C_ARCH_S390X
 | |
| 	case ArchPARISC:
 | |
| 		return C.C_ARCH_PARISC
 | |
| 	case ArchPARISC64:
 | |
| 		return C.C_ARCH_PARISC64
 | |
| 	case ArchNative:
 | |
| 		return C.C_ARCH_NATIVE
 | |
| 	default:
 | |
| 		return 0x0
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Only use with sanitized ops, no error handling
 | |
| func (a ScmpCompareOp) toNative() C.int {
 | |
| 	switch a {
 | |
| 	case CompareNotEqual:
 | |
| 		return C.C_CMP_NE
 | |
| 	case CompareLess:
 | |
| 		return C.C_CMP_LT
 | |
| 	case CompareLessOrEqual:
 | |
| 		return C.C_CMP_LE
 | |
| 	case CompareEqual:
 | |
| 		return C.C_CMP_EQ
 | |
| 	case CompareGreaterEqual:
 | |
| 		return C.C_CMP_GE
 | |
| 	case CompareGreater:
 | |
| 		return C.C_CMP_GT
 | |
| 	case CompareMaskedEqual:
 | |
| 		return C.C_CMP_MASKED_EQ
 | |
| 	default:
 | |
| 		return 0x0
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func actionFromNative(a C.uint32_t) (ScmpAction, error) {
 | |
| 	aTmp := a & 0xFFFF
 | |
| 	switch a & 0xFFFF0000 {
 | |
| 	case C.C_ACT_KILL:
 | |
| 		return ActKill, nil
 | |
| 	case C.C_ACT_KILL_PROCESS:
 | |
| 		return ActKillProcess, nil
 | |
| 	case C.C_ACT_KILL_THREAD:
 | |
| 		return ActKillThread, nil
 | |
| 	case C.C_ACT_TRAP:
 | |
| 		return ActTrap, nil
 | |
| 	case C.C_ACT_ERRNO:
 | |
| 		return ActErrno.SetReturnCode(int16(aTmp)), nil
 | |
| 	case C.C_ACT_TRACE:
 | |
| 		return ActTrace.SetReturnCode(int16(aTmp)), nil
 | |
| 	case C.C_ACT_LOG:
 | |
| 		return ActLog, nil
 | |
| 	case C.C_ACT_ALLOW:
 | |
| 		return ActAllow, nil
 | |
| 	case C.C_ACT_NOTIFY:
 | |
| 		return ActNotify, nil
 | |
| 	default:
 | |
| 		return 0x0, fmt.Errorf("unrecognized action %#x", uint32(a))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Only use with sanitized actions, no error handling
 | |
| func (a ScmpAction) toNative() C.uint32_t {
 | |
| 	switch a & 0xFFFF {
 | |
| 	case ActKill:
 | |
| 		return C.C_ACT_KILL
 | |
| 	case ActKillProcess:
 | |
| 		return C.C_ACT_KILL_PROCESS
 | |
| 	case ActKillThread:
 | |
| 		return C.C_ACT_KILL_THREAD
 | |
| 	case ActTrap:
 | |
| 		return C.C_ACT_TRAP
 | |
| 	case ActErrno:
 | |
| 		return C.C_ACT_ERRNO | (C.uint32_t(a) >> 16)
 | |
| 	case ActTrace:
 | |
| 		return C.C_ACT_TRACE | (C.uint32_t(a) >> 16)
 | |
| 	case ActLog:
 | |
| 		return C.C_ACT_LOG
 | |
| 	case ActAllow:
 | |
| 		return C.C_ACT_ALLOW
 | |
| 	case ActNotify:
 | |
| 		return C.C_ACT_NOTIFY
 | |
| 	default:
 | |
| 		return 0x0
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Internal only, assumes safe attribute
 | |
| func (a scmpFilterAttr) toNative() uint32 {
 | |
| 	switch a {
 | |
| 	case filterAttrActDefault:
 | |
| 		return uint32(C.C_ATTRIBUTE_DEFAULT)
 | |
| 	case filterAttrActBadArch:
 | |
| 		return uint32(C.C_ATTRIBUTE_BADARCH)
 | |
| 	case filterAttrNNP:
 | |
| 		return uint32(C.C_ATTRIBUTE_NNP)
 | |
| 	case filterAttrTsync:
 | |
| 		return uint32(C.C_ATTRIBUTE_TSYNC)
 | |
| 	case filterAttrLog:
 | |
| 		return uint32(C.C_ATTRIBUTE_LOG)
 | |
| 	case filterAttrSSB:
 | |
| 		return uint32(C.C_ATTRIBUTE_SSB)
 | |
| 	default:
 | |
| 		return 0x0
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (a ScmpSyscall) toNative() C.uint32_t {
 | |
| 	return C.uint32_t(a)
 | |
| }
 | |
| 
 | |
| func syscallFromNative(a C.int) ScmpSyscall {
 | |
| 	return ScmpSyscall(a)
 | |
| }
 | |
| 
 | |
| func notifReqFromNative(req *C.struct_seccomp_notif) (*ScmpNotifReq, error) {
 | |
| 	scmpArgs := make([]uint64, 6)
 | |
| 	for i := 0; i < len(scmpArgs); i++ {
 | |
| 		scmpArgs[i] = uint64(req.data.args[i])
 | |
| 	}
 | |
| 
 | |
| 	arch, err := archFromNative(req.data.arch)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	scmpData := ScmpNotifData{
 | |
| 		Syscall:      syscallFromNative(req.data.nr),
 | |
| 		Arch:         arch,
 | |
| 		InstrPointer: uint64(req.data.instruction_pointer),
 | |
| 		Args:         scmpArgs,
 | |
| 	}
 | |
| 
 | |
| 	scmpReq := &ScmpNotifReq{
 | |
| 		ID:    uint64(req.id),
 | |
| 		Pid:   uint32(req.pid),
 | |
| 		Flags: uint32(req.flags),
 | |
| 		Data:  scmpData,
 | |
| 	}
 | |
| 
 | |
| 	return scmpReq, nil
 | |
| }
 | |
| 
 | |
| func (scmpResp *ScmpNotifResp) toNative(resp *C.struct_seccomp_notif_resp) {
 | |
| 	resp.id = C.__u64(scmpResp.ID)
 | |
| 	resp.val = C.__s64(scmpResp.Val)
 | |
| 	resp.error = (C.__s32(scmpResp.Error) * -1) // kernel requires a negated value
 | |
| 	resp.flags = C.__u32(scmpResp.Flags)
 | |
| }
 | |
| 
 | |
| // Userspace Notification API
 | |
| // Calls to C.seccomp_notify* hidden from seccomp.go
 | |
| 
 | |
| func (f *ScmpFilter) getNotifFd() (ScmpFd, error) {
 | |
| 	f.lock.Lock()
 | |
| 	defer f.lock.Unlock()
 | |
| 
 | |
| 	if !f.valid {
 | |
| 		return -1, errBadFilter
 | |
| 	}
 | |
| 
 | |
| 	// Ignore error, if not supported returns apiLevel == 0
 | |
| 	apiLevel, _ := GetAPI()
 | |
| 	if apiLevel < 6 {
 | |
| 		return -1, fmt.Errorf("seccomp notification requires API level >= 6; current level = %d", apiLevel)
 | |
| 	}
 | |
| 
 | |
| 	fd := C.seccomp_notify_fd(f.filterCtx)
 | |
| 
 | |
| 	return ScmpFd(fd), nil
 | |
| }
 | |
| 
 | |
| func notifReceive(fd ScmpFd) (*ScmpNotifReq, error) {
 | |
| 	var req *C.struct_seccomp_notif
 | |
| 	var resp *C.struct_seccomp_notif_resp
 | |
| 
 | |
| 	// Ignore error, if not supported returns apiLevel == 0
 | |
| 	apiLevel, _ := GetAPI()
 | |
| 	if apiLevel < 6 {
 | |
| 		return nil, fmt.Errorf("seccomp notification requires API level >= 6; current level = %d", apiLevel)
 | |
| 	}
 | |
| 
 | |
| 	// we only use the request here; the response is unused
 | |
| 	if retCode := C.seccomp_notify_alloc(&req, &resp); retCode != 0 {
 | |
| 		return nil, errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		C.seccomp_notify_free(req, resp)
 | |
| 	}()
 | |
| 
 | |
| 	for {
 | |
| 		retCode, errno := C.seccomp_notify_receive(C.int(fd), req)
 | |
| 		if retCode == 0 {
 | |
| 			break
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.EINTR {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.ENOENT {
 | |
| 			return nil, errno
 | |
| 		}
 | |
| 
 | |
| 		return nil, errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	return notifReqFromNative(req)
 | |
| }
 | |
| 
 | |
| func notifRespond(fd ScmpFd, scmpResp *ScmpNotifResp) error {
 | |
| 	var req *C.struct_seccomp_notif
 | |
| 	var resp *C.struct_seccomp_notif_resp
 | |
| 
 | |
| 	// Ignore error, if not supported returns apiLevel == 0
 | |
| 	apiLevel, _ := GetAPI()
 | |
| 	if apiLevel < 6 {
 | |
| 		return fmt.Errorf("seccomp notification requires API level >= 6; current level = %d", apiLevel)
 | |
| 	}
 | |
| 
 | |
| 	// we only use the reponse here; the request is discarded
 | |
| 	if retCode := C.seccomp_notify_alloc(&req, &resp); retCode != 0 {
 | |
| 		return errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	defer func() {
 | |
| 		C.seccomp_notify_free(req, resp)
 | |
| 	}()
 | |
| 
 | |
| 	scmpResp.toNative(resp)
 | |
| 
 | |
| 	for {
 | |
| 		retCode, errno := C.seccomp_notify_respond(C.int(fd), resp)
 | |
| 		if retCode == 0 {
 | |
| 			break
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.EINTR {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.ENOENT {
 | |
| 			return errno
 | |
| 		}
 | |
| 
 | |
| 		return errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func notifIDValid(fd ScmpFd, id uint64) error {
 | |
| 	// Ignore error, if not supported returns apiLevel == 0
 | |
| 	apiLevel, _ := GetAPI()
 | |
| 	if apiLevel < 6 {
 | |
| 		return fmt.Errorf("seccomp notification requires API level >= 6; current level = %d", apiLevel)
 | |
| 	}
 | |
| 
 | |
| 	for {
 | |
| 		retCode, errno := C.seccomp_notify_id_valid(C.int(fd), C.uint64_t(id))
 | |
| 		if retCode == 0 {
 | |
| 			break
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.EINTR {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if errno == syscall.ENOENT {
 | |
| 			return errno
 | |
| 		}
 | |
| 
 | |
| 		return errRc(retCode)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |