-
Notifications
You must be signed in to change notification settings - Fork 764
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Android SECCOMP forbids accept4 on x86 #1445
Labels
has pr
Issue has a pull request.
Comments
jshearer
added a commit
to jshearer/mio
that referenced
this issue
Jan 24, 2021
Description in, closes tokio-rs#1445
jshearer
added a commit
to jshearer/mio
that referenced
this issue
Jan 24, 2021
Description in, closes tokio-rs#1445
jshearer
added a commit
to jshearer/mio
that referenced
this issue
Jan 25, 2021
Description in, closes tokio-rs#1445
jshearer
added a commit
to jshearer/mio
that referenced
this issue
Jan 25, 2021
Description in, closes tokio-rs#1445
jshearer
added a commit
to jshearer/mio
that referenced
this issue
Jan 25, 2021
Description in, closes tokio-rs#1445
tormol
added a commit
to tormol/uds
that referenced
this issue
Jan 31, 2021
It's apparentnly prohibited by SECCOMP there: tokio-rs/mio#1445
wngr
pushed a commit
to Actyx/mio
that referenced
this issue
Feb 22, 2021
Description in, closes tokio-rs#1445
Thomasdezeeuw
pushed a commit
to Thomasdezeeuw/mio
that referenced
this issue
Feb 22, 2021
Description in, closes tokio-rs#1445
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
It appears that when running native code on Android x86 (such as in the emulator), the seccomp profile forbids syscall 364 which maps to
accept4
. Would a PR to include android x86 in the list of targets that getaccept
instead ofaccept4
be approved?The text was updated successfully, but these errors were encountered: