diff options
author | Thiago Macieira <thiago.macieira@intel.com> | 2018-01-07 15:32:35 -0600 |
---|---|---|
committer | Thiago Macieira <thiago.macieira@intel.com> | 2018-03-14 19:26:02 +0000 |
commit | 8eb3944dac81b8c51d7bac7784204d457551b50c (patch) | |
tree | 863c9db0660ea4671e600a5d4cc8dd474ef3a1fa /src/platformsupport/eventdispatchers/qwindowsguieventdispatcher.cpp | |
parent | 96ba39b1ee095e814587c760dc83add03ee67232 (diff) |
Disable statx(2) and renameat2(2) system calls on Android
Many Android systems come with a locked down system call list, causing
the statx(2) system call to fail with an unexpected error code or by
delivering a signal to the application. Because of the signal, we can't
do runtime detection...
This is not our bug: it's obviously a mistake in the SECCOMP rules in
Android. But we work around the issue.
Unfortunately, because of a few manufacturers who can't configure their
rules properly, everyone will suffer.
Task-number: QTBUG-64490
Change-Id: I39332e0a867442d58082fffd1507a49415917384
Reviewed-by: BogDan Vatra <bogdan@kdab.com>
Diffstat (limited to 'src/platformsupport/eventdispatchers/qwindowsguieventdispatcher.cpp')
0 files changed, 0 insertions, 0 deletions