/* Copyright The containerd Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /* Copyright The runc Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package seccomp import ( "sync" "golang.org/x/sys/unix" ) var ( enabled bool enabledOnce sync.Once ) // isEnabled returns whether the kernel has been configured to support seccomp // (including the check for CONFIG_SECCOMP_FILTER kernel option). func isEnabled() bool { // Excerpts from prctl(2), section ERRORS: // // EACCES // option is PR_SET_SECCOMP and arg2 is SECCOMP_MODE_FILTER, but // the process does not have the CAP_SYS_ADMIN capability or has // not set the no_new_privs attribute <...>. // <...> // EFAULT // option is PR_SET_SECCOMP, arg2 is SECCOMP_MODE_FILTER, the // system was built with CONFIG_SECCOMP_FILTER, and arg3 is an // invalid address. // <...> // EINVAL // option is PR_SET_SECCOMP or PR_GET_SECCOMP, and the kernel // was not configured with CONFIG_SECCOMP. // // EINVAL // option is PR_SET_SECCOMP, arg2 is SECCOMP_MODE_FILTER, // and the kernel was not configured with CONFIG_SECCOMP_FILTER. // // // Meaning, in case these kernel options are set (this is what we check // for here), we will get some other error (most probably EACCES or // EFAULT). IOW, EINVAL means "seccomp not supported", any other error // means it is supported. enabledOnce.Do(func() { enabled = unix.Prctl(unix.PR_SET_SECCOMP, unix.SECCOMP_MODE_FILTER, 0, 0, 0) != unix.EINVAL }) return enabled }