github.com/skanehira/moby@v17.12.1-ce-rc2+incompatible/profiles/seccomp/seccomp.go (about) 1 // +build linux 2 3 package seccomp 4 5 import ( 6 "encoding/json" 7 "errors" 8 "fmt" 9 10 "github.com/docker/docker/api/types" 11 "github.com/opencontainers/runtime-spec/specs-go" 12 libseccomp "github.com/seccomp/libseccomp-golang" 13 ) 14 15 //go:generate go run -tags 'seccomp' generate.go 16 17 // GetDefaultProfile returns the default seccomp profile. 18 func GetDefaultProfile(rs *specs.Spec) (*specs.LinuxSeccomp, error) { 19 return setupSeccomp(DefaultProfile(), rs) 20 } 21 22 // LoadProfile takes a json string and decodes the seccomp profile. 23 func LoadProfile(body string, rs *specs.Spec) (*specs.LinuxSeccomp, error) { 24 var config types.Seccomp 25 if err := json.Unmarshal([]byte(body), &config); err != nil { 26 return nil, fmt.Errorf("Decoding seccomp profile failed: %v", err) 27 } 28 return setupSeccomp(&config, rs) 29 } 30 31 var nativeToSeccomp = map[string]types.Arch{ 32 "amd64": types.ArchX86_64, 33 "arm64": types.ArchAARCH64, 34 "mips64": types.ArchMIPS64, 35 "mips64n32": types.ArchMIPS64N32, 36 "mipsel64": types.ArchMIPSEL64, 37 "mipsel64n32": types.ArchMIPSEL64N32, 38 "s390x": types.ArchS390X, 39 } 40 41 // inSlice tests whether a string is contained in a slice of strings or not. 42 // Comparison is case sensitive 43 func inSlice(slice []string, s string) bool { 44 for _, ss := range slice { 45 if s == ss { 46 return true 47 } 48 } 49 return false 50 } 51 52 func setupSeccomp(config *types.Seccomp, rs *specs.Spec) (*specs.LinuxSeccomp, error) { 53 if config == nil { 54 return nil, nil 55 } 56 57 // No default action specified, no syscalls listed, assume seccomp disabled 58 if config.DefaultAction == "" && len(config.Syscalls) == 0 { 59 return nil, nil 60 } 61 62 newConfig := &specs.LinuxSeccomp{} 63 64 var arch string 65 var native, err = libseccomp.GetNativeArch() 66 if err == nil { 67 arch = native.String() 68 } 69 70 if len(config.Architectures) != 0 && len(config.ArchMap) != 0 { 71 return nil, errors.New("'architectures' and 'archMap' were specified in the seccomp profile, use either 'architectures' or 'archMap'") 72 } 73 74 // if config.Architectures == 0 then libseccomp will figure out the architecture to use 75 if len(config.Architectures) != 0 { 76 for _, a := range config.Architectures { 77 newConfig.Architectures = append(newConfig.Architectures, specs.Arch(a)) 78 } 79 } 80 81 if len(config.ArchMap) != 0 { 82 for _, a := range config.ArchMap { 83 seccompArch, ok := nativeToSeccomp[arch] 84 if ok { 85 if a.Arch == seccompArch { 86 newConfig.Architectures = append(newConfig.Architectures, specs.Arch(a.Arch)) 87 for _, sa := range a.SubArches { 88 newConfig.Architectures = append(newConfig.Architectures, specs.Arch(sa)) 89 } 90 break 91 } 92 } 93 } 94 } 95 96 newConfig.DefaultAction = specs.LinuxSeccompAction(config.DefaultAction) 97 98 Loop: 99 // Loop through all syscall blocks and convert them to libcontainer format after filtering them 100 for _, call := range config.Syscalls { 101 if len(call.Excludes.Arches) > 0 { 102 if inSlice(call.Excludes.Arches, arch) { 103 continue Loop 104 } 105 } 106 if len(call.Excludes.Caps) > 0 { 107 for _, c := range call.Excludes.Caps { 108 if inSlice(rs.Process.Capabilities.Effective, c) { 109 continue Loop 110 } 111 } 112 } 113 if len(call.Includes.Arches) > 0 { 114 if !inSlice(call.Includes.Arches, arch) { 115 continue Loop 116 } 117 } 118 if len(call.Includes.Caps) > 0 { 119 for _, c := range call.Includes.Caps { 120 if !inSlice(rs.Process.Capabilities.Effective, c) { 121 continue Loop 122 } 123 } 124 } 125 126 if call.Name != "" && len(call.Names) != 0 { 127 return nil, errors.New("'name' and 'names' were specified in the seccomp profile, use either 'name' or 'names'") 128 } 129 130 if call.Name != "" { 131 newConfig.Syscalls = append(newConfig.Syscalls, createSpecsSyscall(call.Name, call.Action, call.Args)) 132 } 133 134 for _, n := range call.Names { 135 newConfig.Syscalls = append(newConfig.Syscalls, createSpecsSyscall(n, call.Action, call.Args)) 136 } 137 } 138 139 return newConfig, nil 140 } 141 142 func createSpecsSyscall(name string, action types.Action, args []*types.Arg) specs.LinuxSyscall { 143 newCall := specs.LinuxSyscall{ 144 Names: []string{name}, 145 Action: specs.LinuxSeccompAction(action), 146 } 147 148 // Loop through all the arguments of the syscall and convert them 149 for _, arg := range args { 150 newArg := specs.LinuxSeccompArg{ 151 Index: arg.Index, 152 Value: arg.Value, 153 ValueTwo: arg.ValueTwo, 154 Op: specs.LinuxSeccompOperator(arg.Op), 155 } 156 157 newCall.Args = append(newCall.Args, newArg) 158 } 159 return newCall 160 }