Browse code

docs: security: seccomp: mention Docker needs seccomp build and check config

Signed-off-by: Antonio Murdaca <runcom@redhat.com>

Antonio Murdaca authored on 2016/03/03 19:58:40
Showing 1 changed files
... ...
@@ -16,10 +16,16 @@ restrict the actions available within the container. The `seccomp()` system
16 16
 call operates on the seccomp state of the calling process. You can use this
17 17
 feature to restrict your application's access.
18 18
 
19
-This feature is available only if the kernel is configured with `CONFIG_SECCOMP`
20
-enabled.
19
+This feature is available only if Docker has been built with seccomp and the
20
+kernel is configured with `CONFIG_SECCOMP` enabled. To check if your kernel
21
+supports seccomp:
21 22
 
22
-> **Note**: Seccomp profiles require seccomp 2.2.1 and are only
23
+```bash
24
+$ cat /boot/config-`uname -r` | grep CONFIG_SECCOMP=
25
+CONFIG_SECCOMP=y
26
+```
27
+
28
+> **Note**: seccomp profiles require seccomp 2.2.1 and are only
23 29
 > available starting with Debian 9 "Stretch", Ubuntu 15.10 "Wily", and
24 30
 > Fedora 22. To use this feature on Ubuntu 14.04, Debian Wheezy, or
25 31
 > Debian Jessie, you must download the [latest static Docker Linux binary](../installation/binaries.md).
... ...
@@ -31,7 +37,7 @@ The default seccomp profile provides a sane default for running containers with
31 31
 seccomp and disables around 44 system calls out of 300+. It is moderately protective while providing wide application
32 32
 compatibility. The default Docker profile (found [here](https://github.com/docker/docker/blob/master/profiles/seccomp/default.json) has a JSON layout in the following form:
33 33
 
34
-```
34
+```json
35 35
 {
36 36
 	"defaultAction": "SCMP_ACT_ERRNO",
37 37
 	"architectures": [
... ...
@@ -49,7 +55,7 @@ compatibility. The default Docker profile (found [here](https://github.com/docke
49 49
 			"name": "accept4",
50 50
 			"action": "SCMP_ACT_ALLOW",
51 51
 			"args": []
52
-		}
52
+		},
53 53
 		...
54 54
 	]
55 55
 }