diff --git a/profiles/seccomp/default.json b/profiles/seccomp/default.json index 921b2bd3fef4a..f361066a2f7ae 100644 --- a/profiles/seccomp/default.json +++ b/profiles/seccomp/default.json @@ -356,7 +356,6 @@ "signalfd4", "sigprocmask", "sigreturn", - "socket", "socketcall", "socketpair", "splice", @@ -420,6 +419,19 @@ "minKernel": "4.8" } }, + { + "names": [ + "socket" + ], + "action": "SCMP_ACT_ALLOW", + "args": [ + { + "index": 0, + "value": 40, + "op": "SCMP_CMP_NE" + } + ] + }, { "names": [ "personality" diff --git a/profiles/seccomp/default_linux.go b/profiles/seccomp/default_linux.go index 775ab275d6155..1ee7d7a808b08 100644 --- a/profiles/seccomp/default_linux.go +++ b/profiles/seccomp/default_linux.go @@ -348,7 +348,6 @@ func DefaultProfile() *Seccomp { "signalfd4", "sigprocmask", "sigreturn", - "socket", "socketcall", "socketpair", "splice", @@ -415,6 +414,19 @@ func DefaultProfile() *Seccomp { MinKernel: &KernelVersion{4, 8}, }, }, + { + LinuxSyscall: specs.LinuxSyscall{ + Names: []string{"socket"}, + Action: specs.ActAllow, + Args: []specs.LinuxSeccompArg{ + { + Index: 0, + Value: unix.AF_VSOCK, + Op: specs.OpNotEqual, + }, + }, + }, + }, { LinuxSyscall: specs.LinuxSyscall{ Names: []string{"personality"},