This isn't specific to netlink. I removed the two rules from the seccomp
filter and simplified it to just generally block socket(). I also
simplified adding the arches so that only the non-native arch is added,
not the native one. Note that adding the socket() filter *does* work on
both arches if the non-native architecture does not get added, this only
fails with adding x86_64 to the filter on i386.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1526358

Title:
  adding seccomp rule for socket() fails on i386 since kernel 4.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1526358/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to