diff options
-rw-r--r-- | common/flatpak-run.c | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/common/flatpak-run.c b/common/flatpak-run.c index b6cc831..b92f24d 100644 --- a/common/flatpak-run.c +++ b/common/flatpak-run.c @@ -2582,22 +2582,6 @@ setup_seccomp (GPtrArray *argv_array, } } - /* Add in all possible secondary archs we are aware of that - * this kernel might support. */ -#if defined(__i386__) || defined(__x86_64__) - r = seccomp_arch_add (seccomp, SCMP_ARCH_X86); - if (r < 0 && r != -EEXIST) - return flatpak_fail (error, "Failed to add x86 architecture to seccomp filter"); - - r = seccomp_arch_add (seccomp, SCMP_ARCH_X86_64); - if (r < 0 && r != -EEXIST) - return flatpak_fail (error, "Failed to add x86_64 architecture to seccomp filter"); - - r = seccomp_arch_add (seccomp, SCMP_ARCH_X32); - if (r < 0 && r != -EEXIST) - return flatpak_fail (error, "Failed to add x32 architecture to seccomp filter"); -#endif - /* TODO: Should we filter the kernel keyring syscalls in some way? * We do want them to be used by desktop apps, but they could also perhaps * leak system stuff or secrets from other apps. |