// Internal functions for libseccomp Go bindings // No exported functions package seccomp import ( "errors" "fmt" "syscall" ) // Unexported C wrapping code - provides the C-Golang interface // Get the seccomp header in scope // Need stdlib.h for free() on cstrings // To compile libseccomp-golang against a specific version of libseccomp: // cd ../libseccomp && mkdir -p prefix // ./configure --prefix=$PWD/prefix && make && make install // cd ../libseccomp-golang // PKG_CONFIG_PATH=$PWD/../libseccomp/prefix/lib/pkgconfig/ make // LD_PRELOAD=$PWD/../libseccomp/prefix/lib/libseccomp.so.2.5.0 PKG_CONFIG_PATH=$PWD/../libseccomp/prefix/lib/pkgconfig/ make test // #cgo pkg-config: libseccomp /* #include #include #include #if (SCMP_VER_MAJOR < 2) || \ (SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 3) || \ (SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR == 3 && SCMP_VER_MICRO < 1) #error This package requires libseccomp >= v2.3.1 #endif #define ARCH_BAD ~0 const uint32_t C_ARCH_BAD = ARCH_BAD; #ifndef SCMP_ARCH_PPC #define SCMP_ARCH_PPC ARCH_BAD #endif #ifndef SCMP_ARCH_PPC64 #define SCMP_ARCH_PPC64 ARCH_BAD #endif #ifndef SCMP_ARCH_PPC64LE #define SCMP_ARCH_PPC64LE ARCH_BAD #endif #ifndef SCMP_ARCH_S390 #define SCMP_ARCH_S390 ARCH_BAD #endif #ifndef SCMP_ARCH_S390X #define SCMP_ARCH_S390X ARCH_BAD #endif #ifndef SCMP_ARCH_PARISC #define SCMP_ARCH_PARISC ARCH_BAD #endif #ifndef SCMP_ARCH_PARISC64 #define SCMP_ARCH_PARISC64 ARCH_BAD #endif #ifndef SCMP_ARCH_RISCV64 #define SCMP_ARCH_RISCV64 ARCH_BAD #endif const uint32_t C_ARCH_NATIVE = SCMP_ARCH_NATIVE; const uint32_t C_ARCH_X86 = SCMP_ARCH_X86; const uint32_t C_ARCH_X86_64 = SCMP_ARCH_X86_64; const uint32_t C_ARCH_X32 = SCMP_ARCH_X32; const uint32_t C_ARCH_ARM = SCMP_ARCH_ARM; const uint32_t C_ARCH_AARCH64 = SCMP_ARCH_AARCH64; const uint32_t C_ARCH_MIPS = SCMP_ARCH_MIPS; const uint32_t C_ARCH_MIPS64 = SCMP_ARCH_MIPS64; const uint32_t C_ARCH_MIPS64N32 = SCMP_ARCH_MIPS64N32; const uint32_t C_ARCH_MIPSEL = SCMP_ARCH_MIPSEL; const uint32_t C_ARCH_MIPSEL64 = SCMP_ARCH_MIPSEL64; const uint32_t C_ARCH_MIPSEL64N32 = SCMP_ARCH_MIPSEL64N32; const uint32_t C_ARCH_PPC = SCMP_ARCH_PPC; const uint32_t C_ARCH_PPC64 = SCMP_ARCH_PPC64; const uint32_t C_ARCH_PPC64LE = SCMP_ARCH_PPC64LE; const uint32_t C_ARCH_S390 = SCMP_ARCH_S390; const uint32_t C_ARCH_S390X = SCMP_ARCH_S390X; const uint32_t C_ARCH_PARISC = SCMP_ARCH_PARISC; const uint32_t C_ARCH_PARISC64 = SCMP_ARCH_PARISC64; const uint32_t C_ARCH_RISCV64 = SCMP_ARCH_RISCV64; #ifndef SCMP_ACT_LOG #define SCMP_ACT_LOG 0x7ffc0000U #endif #ifndef SCMP_ACT_KILL_PROCESS #define SCMP_ACT_KILL_PROCESS 0x80000000U #endif #ifndef SCMP_ACT_KILL_THREAD #define SCMP_ACT_KILL_THREAD 0x00000000U #endif #ifndef SCMP_ACT_NOTIFY #define SCMP_ACT_NOTIFY 0x7fc00000U #endif const uint32_t C_ACT_KILL = SCMP_ACT_KILL; const uint32_t C_ACT_KILL_PROCESS = SCMP_ACT_KILL_PROCESS; const uint32_t C_ACT_KILL_THREAD = SCMP_ACT_KILL_THREAD; const uint32_t C_ACT_TRAP = SCMP_ACT_TRAP; const uint32_t C_ACT_ERRNO = SCMP_ACT_ERRNO(0); const uint32_t C_ACT_TRACE = SCMP_ACT_TRACE(0); const uint32_t C_ACT_LOG = SCMP_ACT_LOG; const uint32_t C_ACT_ALLOW = SCMP_ACT_ALLOW; const uint32_t C_ACT_NOTIFY = SCMP_ACT_NOTIFY; // The libseccomp SCMP_FLTATR_CTL_LOG member of the scmp_filter_attr enum was // added in v2.4.0 #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 4 #define SCMP_FLTATR_CTL_LOG _SCMP_FLTATR_MIN #endif // The following SCMP_FLTATR_* were added in libseccomp v2.5.0. #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 5 #define SCMP_FLTATR_CTL_SSB _SCMP_FLTATR_MIN #define SCMP_FLTATR_CTL_OPTIMIZE _SCMP_FLTATR_MIN #define SCMP_FLTATR_API_SYSRAWRC _SCMP_FLTATR_MIN #endif const uint32_t C_ATTRIBUTE_DEFAULT = (uint32_t)SCMP_FLTATR_ACT_DEFAULT; const uint32_t C_ATTRIBUTE_BADARCH = (uint32_t)SCMP_FLTATR_ACT_BADARCH; const uint32_t C_ATTRIBUTE_NNP = (uint32_t)SCMP_FLTATR_CTL_NNP; const uint32_t C_ATTRIBUTE_TSYNC = (uint32_t)SCMP_FLTATR_CTL_TSYNC; const uint32_t C_ATTRIBUTE_LOG = (uint32_t)SCMP_FLTATR_CTL_LOG; const uint32_t C_ATTRIBUTE_SSB = (uint32_t)SCMP_FLTATR_CTL_SSB; const uint32_t C_ATTRIBUTE_OPTIMIZE = (uint32_t)SCMP_FLTATR_CTL_OPTIMIZE; const uint32_t C_ATTRIBUTE_SYSRAWRC = (uint32_t)SCMP_FLTATR_API_SYSRAWRC; const int C_CMP_NE = (int)SCMP_CMP_NE; const int C_CMP_LT = (int)SCMP_CMP_LT; const int C_CMP_LE = (int)SCMP_CMP_LE; const int C_CMP_EQ = (int)SCMP_CMP_EQ; const int C_CMP_GE = (int)SCMP_CMP_GE; const int C_CMP_GT = (int)SCMP_CMP_GT; const int C_CMP_MASKED_EQ = (int)SCMP_CMP_MASKED_EQ; const int C_VERSION_MAJOR = SCMP_VER_MAJOR; const int C_VERSION_MINOR = SCMP_VER_MINOR; const int C_VERSION_MICRO = SCMP_VER_MICRO; #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR >= 3 unsigned int get_major_version() { return seccomp_version()->major; } unsigned int get_minor_version() { return seccomp_version()->minor; } unsigned int get_micro_version() { return seccomp_version()->micro; } #else unsigned int get_major_version() { return (unsigned int)C_VERSION_MAJOR; } unsigned int get_minor_version() { return (unsigned int)C_VERSION_MINOR; } unsigned int get_micro_version() { return (unsigned int)C_VERSION_MICRO; } #endif // The libseccomp API level functions were added in v2.4.0 #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 4 const unsigned int seccomp_api_get(void) { // libseccomp-golang requires libseccomp v2.2.0, at a minimum, which // supported API level 2. However, the kernel may not support API level // 2 constructs which are the seccomp() system call and the TSYNC // filter flag. Return the "reserved" value of 0 here to indicate that // proper API level support is not available in libseccomp. return 0; } int seccomp_api_set(unsigned int level) { return -EOPNOTSUPP; } #endif typedef struct scmp_arg_cmp* scmp_cast_t; void* make_arg_cmp_array(unsigned int length) { return calloc(length, sizeof(struct scmp_arg_cmp)); } // Wrapper to add an scmp_arg_cmp struct to an existing arg_cmp array void add_struct_arg_cmp( struct scmp_arg_cmp* arr, unsigned int pos, unsigned int arg, int compare, uint64_t a, uint64_t b ) { arr[pos].arg = arg; arr[pos].op = compare; arr[pos].datum_a = a; arr[pos].datum_b = b; return; } // The seccomp notify API functions were added in v2.5.0 #if SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR < 5 struct seccomp_data { int nr; __u32 arch; __u64 instruction_pointer; __u64 args[6]; }; struct seccomp_notif { __u64 id; __u32 pid; __u32 flags; struct seccomp_data data; }; struct seccomp_notif_resp { __u64 id; __s64 val; __s32 error; __u32 flags; }; int seccomp_notify_alloc(struct seccomp_notif **req, struct seccomp_notif_resp **resp) { return -EOPNOTSUPP; } int seccomp_notify_fd(const scmp_filter_ctx ctx) { return -EOPNOTSUPP; } void seccomp_notify_free(struct seccomp_notif *req, struct seccomp_notif_resp *resp) { } int seccomp_notify_id_valid(int fd, uint64_t id) { return -EOPNOTSUPP; } int seccomp_notify_receive(int fd, struct seccomp_notif *req) { return -EOPNOTSUPP; } int seccomp_notify_respond(int fd, struct seccomp_notif_resp *resp) { return -EOPNOTSUPP; } #endif */ import "C" // Nonexported types type scmpFilterAttr uint32 // Nonexported constants const ( filterAttrActDefault scmpFilterAttr = iota filterAttrActBadArch filterAttrNNP filterAttrTsync filterAttrLog filterAttrSSB filterAttrOptimize filterAttrRawRC ) const ( // An error return from certain libseccomp functions scmpError C.int = -1 // Comparison boundaries to check for architecture validity archStart ScmpArch = ArchNative archEnd ScmpArch = ArchRISCV64 // Comparison boundaries to check for action validity actionStart ScmpAction = ActKillThread actionEnd ScmpAction = ActKillProcess // Comparison boundaries to check for comparison operator validity compareOpStart ScmpCompareOp = CompareNotEqual compareOpEnd ScmpCompareOp = CompareMaskedEqual ) var ( // errBadFilter is thrown on bad filter context. errBadFilter = errors.New("filter is invalid or uninitialized") errDefAction = errors.New("requested action matches default action of filter") // Constants representing library major, minor, and micro versions verMajor = uint(C.get_major_version()) verMinor = uint(C.get_minor_version()) verMicro = uint(C.get_micro_version()) ) // Nonexported functions // checkVersion returns an error if the libseccomp version being used // is less than the one specified by major, minor, and micro arguments. // Argument op is an arbitrary non-empty operation description, which // is used as a part of the error message returned. // // Most users should use checkAPI instead. func checkVersion(op string, major, minor, micro uint) error { if (verMajor > major) || (verMajor == major && verMinor > minor) || (verMajor == major && verMinor == minor && verMicro >= micro) { return nil } return &VersionError{ op: op, major: major, minor: minor, micro: micro, } } func ensureSupportedVersion() error { return checkVersion("seccomp", 2, 3, 1) } // Get the API level func getAPI() (uint, error) { api := C.seccomp_api_get() if api == 0 { return 0, fmt.Errorf("API level operations are not supported") } return uint(api), nil } // Set the API level func setAPI(api uint) error { if retCode := C.seccomp_api_set(C.uint(api)); retCode != 0 { if errRc(retCode) == syscall.EOPNOTSUPP { return fmt.Errorf("API level operations are not supported") } return fmt.Errorf("could not set API level: %v", retCode) } return nil } // Filter helpers // Filter finalizer - ensure that kernel context for filters is freed func filterFinalizer(f *ScmpFilter) { f.Release() } func errRc(rc C.int) error { return syscall.Errno(-1 * rc) } // Get a raw filter attribute func (f *ScmpFilter) getFilterAttr(attr scmpFilterAttr) (C.uint32_t, error) { f.lock.Lock() defer f.lock.Unlock() if !f.valid { return 0x0, errBadFilter } var attribute C.uint32_t retCode := C.seccomp_attr_get(f.filterCtx, attr.toNative(), &attribute) if retCode != 0 { return 0x0, errRc(retCode) } return attribute, nil } // Set a raw filter attribute func (f *ScmpFilter) setFilterAttr(attr scmpFilterAttr, value C.uint32_t) error { f.lock.Lock() defer f.lock.Unlock() if !f.valid { return errBadFilter } retCode := C.seccomp_attr_set(f.filterCtx, attr.toNative(), value) if retCode != 0 { return errRc(retCode) } return nil } // DOES NOT LOCK OR CHECK VALIDITY // Assumes caller has already done this // Wrapper for seccomp_rule_add_... functions func (f *ScmpFilter) addRuleWrapper(call ScmpSyscall, action ScmpAction, exact bool, length C.uint, cond C.scmp_cast_t) error { if length != 0 && cond == nil { return fmt.Errorf("null conditions list, but length is nonzero") } var retCode C.int if exact { retCode = C.seccomp_rule_add_exact_array(f.filterCtx, action.toNative(), C.int(call), length, cond) } else { retCode = C.seccomp_rule_add_array(f.filterCtx, action.toNative(), C.int(call), length, cond) } if retCode != 0 { switch e := errRc(retCode); e { case syscall.EFAULT: return fmt.Errorf("unrecognized syscall %#x", int32(call)) // libseccomp >= v2.5.0 returns EACCES, older versions return EPERM. // TODO: remove EPERM once libseccomp < v2.5.0 is not supported. case syscall.EPERM, syscall.EACCES: return errDefAction case syscall.EINVAL: return fmt.Errorf("two checks on same syscall argument") default: return e } } return nil } // Generic add function for filter rules func (f *ScmpFilter) addRuleGeneric(call ScmpSyscall, action ScmpAction, exact bool, conds []ScmpCondition) error { f.lock.Lock() defer f.lock.Unlock() if !f.valid { return errBadFilter } if len(conds) == 0 { if err := f.addRuleWrapper(call, action, exact, 0, nil); err != nil { return err } } else { argsArr := C.make_arg_cmp_array(C.uint(len(conds))) if argsArr == nil { return fmt.Errorf("error allocating memory for conditions") } defer C.free(argsArr) for i, cond := range conds { C.add_struct_arg_cmp(C.scmp_cast_t(argsArr), C.uint(i), C.uint(cond.Argument), cond.Op.toNative(), C.uint64_t(cond.Operand1), C.uint64_t(cond.Operand2)) } if err := f.addRuleWrapper(call, action, exact, C.uint(len(conds)), C.scmp_cast_t(argsArr)); err != nil { return err } } return nil } // Generic Helpers // Helper - Sanitize Arch token input func sanitizeArch(in ScmpArch) error { if in < archStart || in > archEnd { return fmt.Errorf("unrecognized architecture %#x", uint(in)) } if in.toNative() == C.C_ARCH_BAD { return fmt.Errorf("architecture %v is not supported on this version of the library", in) } return nil } func sanitizeAction(in ScmpAction) error { inTmp := in & 0x0000FFFF if inTmp < actionStart || inTmp > actionEnd { return fmt.Errorf("unrecognized action %#x", uint(inTmp)) } if inTmp != ActTrace && inTmp != ActErrno && (in&0xFFFF0000) != 0 { return fmt.Errorf("highest 16 bits must be zeroed except for Trace and Errno") } return nil } func sanitizeCompareOp(in ScmpCompareOp) error { if in < compareOpStart || in > compareOpEnd { return fmt.Errorf("unrecognized comparison operator %#x", uint(in)) } return nil } func archFromNative(a C.uint32_t) (ScmpArch, error) { switch a { case C.C_ARCH_X86: return ArchX86, nil case C.C_ARCH_X86_64: return ArchAMD64, nil case C.C_ARCH_X32: return ArchX32, nil case C.C_ARCH_ARM: return ArchARM, nil case C.C_ARCH_NATIVE: return ArchNative, nil case C.C_ARCH_AARCH64: return ArchARM64, nil case C.C_ARCH_MIPS: return ArchMIPS, nil case C.C_ARCH_MIPS64: return ArchMIPS64, nil case C.C_ARCH_MIPS64N32: return ArchMIPS64N32, nil case C.C_ARCH_MIPSEL: return ArchMIPSEL, nil case C.C_ARCH_MIPSEL64: return ArchMIPSEL64, nil case C.C_ARCH_MIPSEL64N32: return ArchMIPSEL64N32, nil case C.C_ARCH_PPC: return ArchPPC, nil case C.C_ARCH_PPC64: return ArchPPC64, nil case C.C_ARCH_PPC64LE: return ArchPPC64LE, nil case C.C_ARCH_S390: return ArchS390, nil case C.C_ARCH_S390X: return ArchS390X, nil case C.C_ARCH_PARISC: return ArchPARISC, nil case C.C_ARCH_PARISC64: return ArchPARISC64, nil case C.C_ARCH_RISCV64: return ArchRISCV64, nil default: return 0x0, fmt.Errorf("unrecognized architecture %#x", uint32(a)) } } // Only use with sanitized arches, no error handling func (a ScmpArch) toNative() C.uint32_t { switch a { case ArchX86: return C.C_ARCH_X86 case ArchAMD64: return C.C_ARCH_X86_64 case ArchX32: return C.C_ARCH_X32 case ArchARM: return C.C_ARCH_ARM case ArchARM64: return C.C_ARCH_AARCH64 case ArchMIPS: return C.C_ARCH_MIPS case ArchMIPS64: return C.C_ARCH_MIPS64 case ArchMIPS64N32: return C.C_ARCH_MIPS64N32 case ArchMIPSEL: return C.C_ARCH_MIPSEL case ArchMIPSEL64: return C.C_ARCH_MIPSEL64 case ArchMIPSEL64N32: return C.C_ARCH_MIPSEL64N32 case ArchPPC: return C.C_ARCH_PPC case ArchPPC64: return C.C_ARCH_PPC64 case ArchPPC64LE: return C.C_ARCH_PPC64LE case ArchS390: return C.C_ARCH_S390 case ArchS390X: return C.C_ARCH_S390X case ArchPARISC: return C.C_ARCH_PARISC case ArchPARISC64: return C.C_ARCH_PARISC64 case ArchRISCV64: return C.C_ARCH_RISCV64 case ArchNative: return C.C_ARCH_NATIVE default: return 0x0 } } // Only use with sanitized ops, no error handling func (a ScmpCompareOp) toNative() C.int { switch a { case CompareNotEqual: return C.C_CMP_NE case CompareLess: return C.C_CMP_LT case CompareLessOrEqual: return C.C_CMP_LE case CompareEqual: return C.C_CMP_EQ case CompareGreaterEqual: return C.C_CMP_GE case CompareGreater: return C.C_CMP_GT case CompareMaskedEqual: return C.C_CMP_MASKED_EQ default: return 0x0 } } func actionFromNative(a C.uint32_t) (ScmpAction, error) { aTmp := a & 0xFFFF switch a & 0xFFFF0000 { case C.C_ACT_KILL_PROCESS: return ActKillProcess, nil case C.C_ACT_KILL_THREAD: return ActKillThread, nil case C.C_ACT_TRAP: return ActTrap, nil case C.C_ACT_ERRNO: return ActErrno.SetReturnCode(int16(aTmp)), nil case C.C_ACT_TRACE: return ActTrace.SetReturnCode(int16(aTmp)), nil case C.C_ACT_LOG: return ActLog, nil case C.C_ACT_ALLOW: return ActAllow, nil case C.C_ACT_NOTIFY: return ActNotify, nil default: return 0x0, fmt.Errorf("unrecognized action %#x", uint32(a)) } } // Only use with sanitized actions, no error handling func (a ScmpAction) toNative() C.uint32_t { switch a & 0xFFFF { case ActKillProcess: return C.C_ACT_KILL_PROCESS case ActKillThread: return C.C_ACT_KILL_THREAD case ActTrap: return C.C_ACT_TRAP case ActErrno: return C.C_ACT_ERRNO | (C.uint32_t(a) >> 16) case ActTrace: return C.C_ACT_TRACE | (C.uint32_t(a) >> 16) case ActLog: return C.C_ACT_LOG case ActAllow: return C.C_ACT_ALLOW case ActNotify: return C.C_ACT_NOTIFY default: return 0x0 } } // Internal only, assumes safe attribute func (a scmpFilterAttr) toNative() uint32 { switch a { case filterAttrActDefault: return uint32(C.C_ATTRIBUTE_DEFAULT) case filterAttrActBadArch: return uint32(C.C_ATTRIBUTE_BADARCH) case filterAttrNNP: return uint32(C.C_ATTRIBUTE_NNP) case filterAttrTsync: return uint32(C.C_ATTRIBUTE_TSYNC) case filterAttrLog: return uint32(C.C_ATTRIBUTE_LOG) case filterAttrSSB: return uint32(C.C_ATTRIBUTE_SSB) case filterAttrOptimize: return uint32(C.C_ATTRIBUTE_OPTIMIZE) case filterAttrRawRC: return uint32(C.C_ATTRIBUTE_SYSRAWRC) default: return 0x0 } } func syscallFromNative(a C.int) ScmpSyscall { return ScmpSyscall(a) } func notifReqFromNative(req *C.struct_seccomp_notif) (*ScmpNotifReq, error) { scmpArgs := make([]uint64, 6) for i := 0; i < len(scmpArgs); i++ { scmpArgs[i] = uint64(req.data.args[i]) } arch, err := archFromNative(req.data.arch) if err != nil { return nil, err } scmpData := ScmpNotifData{ Syscall: syscallFromNative(req.data.nr), Arch: arch, InstrPointer: uint64(req.data.instruction_pointer), Args: scmpArgs, } scmpReq := &ScmpNotifReq{ ID: uint64(req.id), Pid: uint32(req.pid), Flags: uint32(req.flags), Data: scmpData, } return scmpReq, nil } func (scmpResp *ScmpNotifResp) toNative(resp *C.struct_seccomp_notif_resp) { resp.id = C.__u64(scmpResp.ID) resp.val = C.__s64(scmpResp.Val) resp.error = (C.__s32(scmpResp.Error) * -1) // kernel requires a negated value resp.flags = C.__u32(scmpResp.Flags) } // checkAPI checks that both the API level and the seccomp version is equal to // or greater than the specified minLevel and major, minor, micro, // respectively, and returns an error otherwise. Argument op is an arbitrary // non-empty operation description, used as a part of the error message // returned. func checkAPI(op string, minLevel uint, major, minor, micro uint) error { // Ignore error from getAPI, as it returns level == 0 in case of error. level, _ := getAPI() if level >= minLevel { return checkVersion(op, major, minor, micro) } return &VersionError{ op: op, curAPI: level, minAPI: minLevel, major: major, minor: minor, micro: micro, } } // Userspace Notification API // Calls to C.seccomp_notify* hidden from seccomp.go func notifSupported() error { return checkAPI("seccomp notification", 6, 2, 5, 0) } func (f *ScmpFilter) getNotifFd() (ScmpFd, error) { f.lock.Lock() defer f.lock.Unlock() if !f.valid { return -1, errBadFilter } if err := notifSupported(); err != nil { return -1, err } fd := C.seccomp_notify_fd(f.filterCtx) return ScmpFd(fd), nil } func notifReceive(fd ScmpFd) (*ScmpNotifReq, error) { var req *C.struct_seccomp_notif var resp *C.struct_seccomp_notif_resp if err := notifSupported(); err != nil { return nil, err } // we only use the request here; the response is unused if retCode := C.seccomp_notify_alloc(&req, &resp); retCode != 0 { return nil, errRc(retCode) } defer func() { C.seccomp_notify_free(req, resp) }() for { retCode, errno := C.seccomp_notify_receive(C.int(fd), req) if retCode == 0 { break } if errno == syscall.EINTR { continue } if errno == syscall.ENOENT { return nil, errno } return nil, errRc(retCode) } return notifReqFromNative(req) } func notifRespond(fd ScmpFd, scmpResp *ScmpNotifResp) error { var req *C.struct_seccomp_notif var resp *C.struct_seccomp_notif_resp if err := notifSupported(); err != nil { return err } // we only use the response here; the request is discarded if retCode := C.seccomp_notify_alloc(&req, &resp); retCode != 0 { return errRc(retCode) } defer func() { C.seccomp_notify_free(req, resp) }() scmpResp.toNative(resp) for { retCode, errno := C.seccomp_notify_respond(C.int(fd), resp) if retCode == 0 { break } if errno == syscall.EINTR { continue } if errno == syscall.ENOENT { return errno } return errRc(retCode) } return nil } func notifIDValid(fd ScmpFd, id uint64) error { if err := notifSupported(); err != nil { return err } for { retCode, errno := C.seccomp_notify_id_valid(C.int(fd), C.uint64_t(id)) if retCode == 0 { break } if errno == syscall.EINTR { continue } if errno == syscall.ENOENT { return errno } return errRc(retCode) } return nil }