Skip to content

Revert "seccomp: Block socketcall to prevent AF_ALG filter bypass"#23

Merged
thaJeztah merged 1 commit intomoby:mainfrom
vvoland:revert-socketcall
May 6, 2026
Merged

Revert "seccomp: Block socketcall to prevent AF_ALG filter bypass"#23
thaJeztah merged 1 commit intomoby:mainfrom
vvoland:revert-socketcall

Conversation

@vvoland
Copy link
Copy Markdown
Contributor

@vvoland vvoland commented May 6, 2026

Blocking whole socketcall had much bigger impact on x86 binaries than anticipated.

Drop the seccomp based block in favor of AppArmor/SELinux based one (#22, moby/moby#52547)

Seccomp cannot filter socketcall(2) arguments because the address family is behind a userspace pointer that BPF cannot dereference.

Only an LSM (AppArmor or SELinux) can deny AF_ALG via the security_socket_create hook in the socketcall path.

Blocking whole `socketcall` had much bigger impact on x86 binaries than
anticipated.

Drop the seccomp based block in favor of AppArmor/SELinux based one.

Seccomp cannot filter socketcall(2) arguments because the address family
is behind a userspace pointer that BPF cannot dereference.

Only an LSM (AppArmor or SELinux) can deny AF_ALG via the
security_socket_create hook in the socketcall path.

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
@vvoland vvoland self-assigned this May 6, 2026
@vvoland vvoland requested a review from thaJeztah May 6, 2026 10:47
Copy link
Copy Markdown
Member

@thaJeztah thaJeztah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@thaJeztah thaJeztah merged commit 836ae4d into moby:main May 6, 2026
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants