Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Android SECCOMP forbids accept4 on x86 #1445

Closed
jshearer opened this issue Jan 24, 2021 · 0 comments
Closed

Android SECCOMP forbids accept4 on x86 #1445

jshearer opened this issue Jan 24, 2021 · 0 comments
Labels
has pr Issue has a pull request.

Comments

@jshearer
Copy link
Contributor

It appears that when running native code on Android x86 (such as in the emulator), the seccomp profile forbids syscall 364 which maps to accept4. Would a PR to include android x86 in the list of targets that get accept instead of accept4 be approved?

01-24 14:43:55.326 18621 18621 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-24 14:43:55.326 18621 18621 F DEBUG   : Build fingerprint: 'google/sdk_gphone_x86/generic_x86:10/QSR1.200715.002/6695061:userdebug/dev-keys'
01-24 14:43:55.326 18621 18621 F DEBUG   : Revision: '0'
01-24 14:43:55.326 18621 18621 F DEBUG   : ABI: 'x86'
01-24 14:43:55.328 18621 18621 F DEBUG   : Timestamp: 2021-01-24 14:43:55-0500
01-24 14:43:55.328 18621 18621 F DEBUG   : pid: 18525, tid: 18607, name: tokio-runtime-w  >>> com.xxx <<<
01-24 14:43:55.328 18621 18621 F DEBUG   : uid: 10134
01-24 14:43:55.328 18621 18621 F DEBUG   : signal 31 (SIGSYS), code 1 (SYS_SECCOMP), fault addr --------
01-24 14:43:55.328 18621 18621 F DEBUG   : Cause: seccomp prevented call to disallowed x86 system call 364
01-24 14:43:55.328 18621 18621 F DEBUG   :     eax 0000016c  ebx 00000066  ecx b4c5b3d0  edx b4c5b3cc
01-24 14:43:55.328 18621 18621 F DEBUG   :     edi d233b034  esi 00080800
01-24 14:43:55.328 18621 18621 F DEBUG   :     ebp bcbd2e48  esp b4c5b378  eip ed8b4ef9
01-24 14:43:55.331 18621 18621 F DEBUG   :
01-24 14:43:55.331 18621 18621 F DEBUG   : backtrace:
01-24 14:43:55.331 18621 18621 F DEBUG   :       #00 pc 00000ef9  [vdso] (__kernel_vsyscall+9)
01-24 14:43:55.331 18621 18621 F DEBUG   :       #01 pc 00092328  /apex/com.android.runtime/lib/bionic/libc.so (syscall+40) (BuildId: 471745f0fbbcedb3db1553d5bd6fcd8b)
01-24 14:43:55.331 18621 18621 F DEBUG   :       #02 pc 02b4cadf  /data/app/com.xxx-XUlpEulmSi9ahcxULGtS2Q==/lib/x86/libmy_special_library.so (offset 0xe35000)
jshearer added a commit to jshearer/mio that referenced this issue Jan 24, 2021
jshearer added a commit to jshearer/mio that referenced this issue Jan 24, 2021
@Thomasdezeeuw Thomasdezeeuw added the has pr Issue has a pull request. label Jan 25, 2021
jshearer added a commit to jshearer/mio that referenced this issue Jan 25, 2021
jshearer added a commit to jshearer/mio that referenced this issue Jan 25, 2021
jshearer added a commit to jshearer/mio that referenced this issue Jan 25, 2021
tormol added a commit to tormol/uds that referenced this issue Jan 31, 2021
It's apparentnly prohibited by SECCOMP there:
tokio-rs/mio#1445
wngr pushed a commit to Actyx/mio that referenced this issue Feb 22, 2021
Thomasdezeeuw pushed a commit to Thomasdezeeuw/mio that referenced this issue Feb 22, 2021
Thomasdezeeuw pushed a commit that referenced this issue Feb 22, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
has pr Issue has a pull request.
Projects
None yet
Development

No branches or pull requests

2 participants