diff --git a/profiles/seccomp/default.json b/profiles/seccomp/default.json index fbee6eac0e959..3399c3844df2d 100644 --- a/profiles/seccomp/default.json +++ b/profiles/seccomp/default.json @@ -348,6 +348,7 @@ "signalfd4", "sigprocmask", "sigreturn", + "socket", "socketcall", "socketpair", "splice", @@ -416,22 +417,6 @@ }, "excludes": {} }, - { - "names": [ - "socket" - ], - "action": "SCMP_ACT_ALLOW", - "args": [ - { - "index": 0, - "value": 40, - "op": "SCMP_CMP_NE" - } - ], - "comment": "", - "includes": {}, - "excludes": {} - }, { "names": [ "personality" @@ -862,4 +847,4 @@ "excludes": {} } ] -} \ No newline at end of file +} diff --git a/profiles/seccomp/default_linux.go b/profiles/seccomp/default_linux.go index 3c06d520135d9..a7e2c8049ab15 100644 --- a/profiles/seccomp/default_linux.go +++ b/profiles/seccomp/default_linux.go @@ -343,6 +343,7 @@ func DefaultProfile() *Seccomp { "signalfd4", "sigprocmask", "sigreturn", + "socket", "socketcall", "socketpair", "splice", @@ -403,17 +404,6 @@ func DefaultProfile() *Seccomp { MinKernel: &KernelVersion{4, 8}, }, }, - { - Names: []string{"socket"}, - Action: specs.ActAllow, - Args: []*specs.LinuxSeccompArg{ - { - Index: 0, - Value: unix.AF_VSOCK, - Op: specs.OpNotEqual, - }, - }, - }, { Names: []string{"personality"}, Action: specs.ActAllow,