Signed-off-by: Antonio Murdaca <runcom@redhat.com>
| ... | ... |
@@ -16,10 +16,16 @@ restrict the actions available within the container. The `seccomp()` system |
| 16 | 16 |
call operates on the seccomp state of the calling process. You can use this |
| 17 | 17 |
feature to restrict your application's access. |
| 18 | 18 |
|
| 19 |
-This feature is available only if the kernel is configured with `CONFIG_SECCOMP` |
|
| 20 |
-enabled. |
|
| 19 |
+This feature is available only if Docker has been built with seccomp and the |
|
| 20 |
+kernel is configured with `CONFIG_SECCOMP` enabled. To check if your kernel |
|
| 21 |
+supports seccomp: |
|
| 21 | 22 |
|
| 22 |
-> **Note**: Seccomp profiles require seccomp 2.2.1 and are only |
|
| 23 |
+```bash |
|
| 24 |
+$ cat /boot/config-`uname -r` | grep CONFIG_SECCOMP= |
|
| 25 |
+CONFIG_SECCOMP=y |
|
| 26 |
+``` |
|
| 27 |
+ |
|
| 28 |
+> **Note**: seccomp profiles require seccomp 2.2.1 and are only |
|
| 23 | 29 |
> available starting with Debian 9 "Stretch", Ubuntu 15.10 "Wily", and |
| 24 | 30 |
> Fedora 22. To use this feature on Ubuntu 14.04, Debian Wheezy, or |
| 25 | 31 |
> Debian Jessie, you must download the [latest static Docker Linux binary](../installation/binaries.md). |
| ... | ... |
@@ -31,7 +37,7 @@ The default seccomp profile provides a sane default for running containers with |
| 31 | 31 |
seccomp and disables around 44 system calls out of 300+. It is moderately protective while providing wide application |
| 32 | 32 |
compatibility. The default Docker profile (found [here](https://github.com/docker/docker/blob/master/profiles/seccomp/default.json) has a JSON layout in the following form: |
| 33 | 33 |
|
| 34 |
-``` |
|
| 34 |
+```json |
|
| 35 | 35 |
{
|
| 36 | 36 |
"defaultAction": "SCMP_ACT_ERRNO", |
| 37 | 37 |
"architectures": [ |
| ... | ... |
@@ -49,7 +55,7 @@ compatibility. The default Docker profile (found [here](https://github.com/docke |
| 49 | 49 |
"name": "accept4", |
| 50 | 50 |
"action": "SCMP_ACT_ALLOW", |
| 51 | 51 |
"args": [] |
| 52 |
- } |
|
| 52 |
+ }, |
|
| 53 | 53 |
... |
| 54 | 54 |
] |
| 55 | 55 |
} |