@@ -23,6 +23,7 @@ macro_rules! or_panic {
23
23
}
24
24
25
25
#[test]
26
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
26
27
fn basic() {
27
28
let dir = tmpdir();
28
29
let socket_path = dir.path().join("sock");
@@ -93,6 +94,7 @@ fn pair() {
93
94
}
94
95
95
96
#[test]
97
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
96
98
fn try_clone() {
97
99
let dir = tmpdir();
98
100
let socket_path = dir.path().join("sock");
@@ -119,6 +121,7 @@ fn try_clone() {
119
121
}
120
122
121
123
#[test]
124
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
122
125
fn iter() {
123
126
let dir = tmpdir();
124
127
let socket_path = dir.path().join("sock");
@@ -168,6 +171,7 @@ fn long_path() {
168
171
169
172
#[test]
170
173
#[cfg(not(target_os = "nto"))]
174
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
171
175
fn timeouts() {
172
176
let dir = tmpdir();
173
177
let socket_path = dir.path().join("sock");
@@ -195,6 +199,7 @@ fn timeouts() {
195
199
}
196
200
197
201
#[test]
202
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
198
203
fn test_read_timeout() {
199
204
let dir = tmpdir();
200
205
let socket_path = dir.path().join("sock");
@@ -214,6 +219,7 @@ fn test_read_timeout() {
214
219
}
215
220
216
221
#[test]
222
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
217
223
fn test_read_with_timeout() {
218
224
let dir = tmpdir();
219
225
let socket_path = dir.path().join("sock");
@@ -241,6 +247,7 @@ fn test_read_with_timeout() {
241
247
// Ensure the `set_read_timeout` and `set_write_timeout` calls return errors
242
248
// when passed zero Durations
243
249
#[test]
250
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
244
251
fn test_unix_stream_timeout_zero_duration() {
245
252
let dir = tmpdir();
246
253
let socket_path = dir.path().join("sock");
@@ -260,6 +267,7 @@ fn test_unix_stream_timeout_zero_duration() {
260
267
}
261
268
262
269
#[test]
270
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
263
271
fn test_unix_datagram() {
264
272
let dir = tmpdir();
265
273
let path1 = dir.path().join("sock1");
@@ -276,6 +284,7 @@ fn test_unix_datagram() {
276
284
}
277
285
278
286
#[test]
287
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
279
288
fn test_unnamed_unix_datagram() {
280
289
let dir = tmpdir();
281
290
let path1 = dir.path().join("sock1");
@@ -293,6 +302,7 @@ fn test_unnamed_unix_datagram() {
293
302
}
294
303
295
304
#[test]
305
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
296
306
fn test_unix_datagram_connect_to_recv_addr() {
297
307
let dir = tmpdir();
298
308
let path1 = dir.path().join("sock1");
@@ -317,6 +327,7 @@ fn test_unix_datagram_connect_to_recv_addr() {
317
327
}
318
328
319
329
#[test]
330
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
320
331
fn test_connect_unix_datagram() {
321
332
let dir = tmpdir();
322
333
let path1 = dir.path().join("sock1");
@@ -343,6 +354,7 @@ fn test_connect_unix_datagram() {
343
354
}
344
355
345
356
#[test]
357
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
346
358
fn test_unix_datagram_recv() {
347
359
let dir = tmpdir();
348
360
let path1 = dir.path().join("sock1");
@@ -385,6 +397,7 @@ fn datagram_pair() {
385
397
// Ensure the `set_read_timeout` and `set_write_timeout` calls return errors
386
398
// when passed zero Durations
387
399
#[test]
400
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
388
401
fn test_unix_datagram_timeout_zero_duration() {
389
402
let dir = tmpdir();
390
403
let path = dir.path().join("sock");
@@ -529,6 +542,7 @@ fn test_abstract_no_pathname_and_not_unnamed() {
529
542
}
530
543
531
544
#[test]
545
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
532
546
fn test_unix_stream_peek() {
533
547
let (txdone, rxdone) = crate::sync::mpsc::channel();
534
548
@@ -561,6 +575,7 @@ fn test_unix_stream_peek() {
561
575
}
562
576
563
577
#[test]
578
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
564
579
fn test_unix_datagram_peek() {
565
580
let dir = tmpdir();
566
581
let path1 = dir.path().join("sock");
@@ -585,6 +600,7 @@ fn test_unix_datagram_peek() {
585
600
}
586
601
587
602
#[test]
603
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
588
604
fn test_unix_datagram_peek_from() {
589
605
let dir = tmpdir();
590
606
let path1 = dir.path().join("sock");
@@ -648,6 +664,7 @@ fn test_send_vectored_fds_unix_stream() {
648
664
649
665
#[cfg(any(target_os = "android", target_os = "linux", target_os = "freebsd"))]
650
666
#[test]
667
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
651
668
fn test_send_vectored_with_ancillary_to_unix_datagram() {
652
669
fn getpid() -> libc::pid_t {
653
670
unsafe { libc::getpid() }
@@ -715,6 +732,7 @@ fn test_send_vectored_with_ancillary_to_unix_datagram() {
715
732
716
733
#[cfg(any(target_os = "android", target_os = "linux"))]
717
734
#[test]
735
+ #[cfg_attr(target_os = "android", ignore)] // Android SELinux rules prevent creating Unix sockets
718
736
fn test_send_vectored_with_ancillary_unix_datagram() {
719
737
let dir = tmpdir();
720
738
let path1 = dir.path().join("sock1");
0 commit comments