daemon/seccomp_linux.go
9c4570a9
 // +build linux,seccomp
 
 package daemon
 
 import (
 	"fmt"
 
 	"github.com/Sirupsen/logrus"
 	"github.com/docker/docker/container"
99b16b35
 	"github.com/docker/docker/profiles/seccomp"
9c4570a9
 	"github.com/opencontainers/specs/specs-go"
 )
 
 func setSeccomp(daemon *Daemon, rs *specs.Spec, c *container.Container) error {
99b16b35
 	var profile *specs.Seccomp
9c4570a9
 	var err error
 
 	if c.HostConfig.Privileged {
 		return nil
 	}
 
 	if !daemon.seccompEnabled {
 		if c.SeccompProfile != "" && c.SeccompProfile != "unconfined" {
 			return fmt.Errorf("Seccomp is not enabled in your kernel, cannot run a custom seccomp profile.")
 		}
 		logrus.Warn("Seccomp is not enabled in your kernel, running container without default profile.")
 		c.SeccompProfile = "unconfined"
 	}
 	if c.SeccompProfile == "unconfined" {
 		return nil
 	}
 	if c.SeccompProfile != "" {
99b16b35
 		profile, err = seccomp.LoadProfile(c.SeccompProfile)
9c4570a9
 		if err != nil {
 			return err
 		}
 	} else {
a01c4dc8
 		profile, err = seccomp.GetDefaultProfile(rs)
99b16b35
 		if err != nil {
 			return err
9c4570a9
 		}
 	}
 
99b16b35
 	rs.Linux.Seccomp = profile
 	return nil
9c4570a9
 }