Stated briefly, the policy is: don't.
Resolves: https://github.com/libsdl-org/SDL/issues/14717
Signed-off-by: Simon McVittie <smcv@debian.org>
(cherry picked from commit 76352f2931)
1.7 KiB
Platforms
Supported Platforms
- Android
- Emscripten
- FreeBSD
- Haiku OS
- iOS
- Linux
- macOS
- NetBSD
- Nintendo Switch
- Nintendo 3DS
- OpenBSD
- PlayStation 2
- PlayStation 4
- PlayStation 5
- PlayStation Portable
- PlayStation Vita
- RISC OS
- SteamOS
- tvOS
- Windows
- Windows GDK
- Xbox
Unsupported Platforms
If your favorite system is listed below, we aren't working on it. However, if you send reasonable patches and are willing to support the port in the long term, we are happy to take a look!
All of these still work with SDL2, which is an incompatible API, but an option if you need to support these platforms still.
- Google Stadia
- NaCL
- Nokia N-Gage
- OS/2
- QNX
- WinPhone
- WinRT/UWP
General notes for Unix platforms
Some aspects of SDL functionality are common to all Unix-based platforms.
Privileged processes (setuid, setgid, setcap)
SDL is not designed to be used in programs with elevated privileges,
such as setuid (chmod u+s) or setgid (chmod g+s) executables,
or executables with file-based capabilities
(setcap cap_sys_nice+ep or similar).
It does not make any attempt to avoid trusting environment variables
or other aspects of the inherited execution environment.
Programs running with elevated privileges in an attacker-controlled
execution environment should not call SDL functions.