diff --git a/Dockerfile.ppc64le b/Dockerfile.ppc64le index a78684cc459519515e22df17223486f3b67db218..9adefcfdf097b65920d79bd3e3c0c6221b91c556 100644 --- a/Dockerfile.ppc64le +++ b/Dockerfile.ppc64le @@ -153,7 +153,7 @@ RUN useradd --create-home --gid docker unprivilegeduser VOLUME /var/lib/docker WORKDIR /go/src/github.com/docker/docker -ENV DOCKER_BUILDTAGS apparmor pkcs11 selinux +ENV DOCKER_BUILDTAGS apparmor pkcs11 seccomp selinux # Let us use a .bashrc file RUN ln -sfv $PWD/.bashrc ~/.bashrc diff --git a/profiles/seccomp/default.json b/profiles/seccomp/default.json index 28d564c1e088c68a35fb51e7b1f62f7fdd938e30..5c70f88ad70a877fbca8e7482a7224a3d4636b58 100755 --- a/profiles/seccomp/default.json +++ b/profiles/seccomp/default.json @@ -1379,6 +1379,11 @@ "action": "SCMP_ACT_ALLOW", "args": [] }, + { + "name": "socketcall", + "action": "SCMP_ACT_ALLOW", + "args": [] + }, { "name": "socketpair", "action": "SCMP_ACT_ALLOW", diff --git a/profiles/seccomp/seccomp_default.go b/profiles/seccomp/seccomp_default.go index be93d780a57bc37e4c22f084558ec5db209de846..4fad7a6c1e4b8424e736f0b69de039e662ff020e 100644 --- a/profiles/seccomp/seccomp_default.go +++ b/profiles/seccomp/seccomp_default.go @@ -1408,6 +1408,11 @@ var DefaultProfile = &types.Seccomp{ Action: types.ActAllow, Args: []*types.Arg{}, }, + { + Name: "socketcall", + Action: types.ActAllow, + Args: []*types.Arg{}, + }, { Name: "socketpair", Action: types.ActAllow,