Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There have been issues[1] with seccomp. Maybe try with seccomp disabled for that container?

  --security-opt seccomp:unconfined
More info here[2].

[1]: https://github.com/docker/for-linux/issues/738

[2]: http://mamememo.blogspot.com/2020/05/cpu-intensive-rubypytho...



seccomp affects syscalls only, which this code doesn't really use. May be worth checking just in case, but it's extremely unlikely that's the issue.


I thought it also turned on/off spectre/meltdown mitigations (impacts branch prediction) on vulnerable cpus.


So TIL turning on seccomp by default turns on mitigations as well. This is not explicitly documented in Docker and it does have the possibility to opt out but doesn't. https://www.phoronix.com/scan.php?page=article&item=linux-42...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: