summaryrefslogtreecommitdiff
path: root/configure
diff options
context:
space:
mode:
Diffstat (limited to 'configure')
-rwxr-xr-xconfigure72
1 files changed, 17 insertions, 55 deletions
diff --git a/configure b/configure
index 4f4d596ab..dc98069c8 100755
--- a/configure
+++ b/configure
@@ -5598,48 +5598,6 @@ if test "x$ac_cv_have_decl_SECCOMP_MODE_FILTER" = xyes; then :
5598fi 5598fi
5599 5599
5600fi 5600fi
5601if test "x$have_seccomp_filter" = "x1" ; then
5602{ $as_echo "$as_me:${as_lineno-$LINENO}: checking kernel for seccomp_filter support" >&5
5603$as_echo_n "checking kernel for seccomp_filter support... " >&6; }
5604if test "$cross_compiling" = yes; then :
5605 { $as_echo "$as_me:${as_lineno-$LINENO}: result: cross-compiling, assuming yes" >&5
5606$as_echo "cross-compiling, assuming yes" >&6; }
5607
5608else
5609 cat confdefs.h - <<_ACEOF >conftest.$ac_ext
5610/* end confdefs.h. */
5611
5612 #include <errno.h>
5613 #include <linux/seccomp.h>
5614 #include <stdlib.h>
5615 #include <sys/prctl.h>
5616
5617int
5618main ()
5619{
5620 errno = 0;
5621 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, 0, 0);
5622 exit(errno == EFAULT ? 0 : 1);
5623 ;
5624 return 0;
5625}
5626_ACEOF
5627if ac_fn_c_try_run "$LINENO"; then :
5628 { $as_echo "$as_me:${as_lineno-$LINENO}: result: yes" >&5
5629$as_echo "yes" >&6; }
5630else
5631
5632 { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5
5633$as_echo "no" >&6; }
5634 # Disable seccomp filter as a target
5635 have_seccomp_filter=0
5636
5637fi
5638rm -f core *.core core.conftest.* gmon.out bb.out conftest$ac_exeext \
5639 conftest.$ac_objext conftest.beam conftest.$ac_ext
5640fi
5641
5642fi
5643 5601
5644use_stack_protector=1 5602use_stack_protector=1
5645 5603
@@ -11898,25 +11856,28 @@ if test "${with_sandbox+set}" = set; then :
11898 11856
11899fi 11857fi
11900 11858
11859SANDBOX_STYLE=""
11901if test "x$sandbox_arg" = "xsystrace" || \ 11860if test "x$sandbox_arg" = "xsystrace" || \
11902 ( test -z "$sandbox_arg" && test "x$have_systr_policy_kill" = "x1" ) ; then 11861 ( test -z "$sandbox_arg" && test "x$have_systr_policy_kill" = "x1" ) ; then
11903 test "x$have_systr_policy_kill" != "x1" && \ 11862 test "x$have_systr_policy_kill" != "x1" && \
11904 as_fn_error $? "systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support" "$LINENO" 5 11863 as_fn_error $? "systrace sandbox requires systrace headers and SYSTR_POLICY_KILL support" "$LINENO" 5
11905 SANDBOX_STYLE="systrace" 11864 SANDBOX_STYLE="$SANDBOX_STYLE systrace"
11906 11865
11907$as_echo "#define SANDBOX_SYSTRACE 1" >>confdefs.h 11866$as_echo "#define SANDBOX_SYSTRACE 1" >>confdefs.h
11908 11867
11909elif test "x$sandbox_arg" = "xdarwin" || \ 11868fi
11869if test "x$sandbox_arg" = "xdarwin" || \
11910 ( test -z "$sandbox_arg" && test "x$ac_cv_func_sandbox_init" = "xyes" && \ 11870 ( test -z "$sandbox_arg" && test "x$ac_cv_func_sandbox_init" = "xyes" && \
11911 test "x$ac_cv_header_sandbox_h" = "xyes") ; then 11871 test "x$ac_cv_header_sandbox_h" = "xyes") ; then
11912 test "x$ac_cv_func_sandbox_init" != "xyes" -o \ 11872 test "x$ac_cv_func_sandbox_init" != "xyes" -o \
11913 "x$ac_cv_header_sandbox_h" != "xyes" && \ 11873 "x$ac_cv_header_sandbox_h" != "xyes" && \
11914 as_fn_error $? "Darwin seatbelt sandbox requires sandbox.h and sandbox_init function" "$LINENO" 5 11874 as_fn_error $? "Darwin seatbelt sandbox requires sandbox.h and sandbox_init function" "$LINENO" 5
11915 SANDBOX_STYLE="darwin" 11875 SANDBOX_STYLE="$SANDBOX_STYLE darwin"
11916 11876
11917$as_echo "#define SANDBOX_DARWIN 1" >>confdefs.h 11877$as_echo "#define SANDBOX_DARWIN 1" >>confdefs.h
11918 11878
11919elif test "x$sandbox_arg" = "xseccomp_filter" || \ 11879fi
11880if test "x$sandbox_arg" = "xseccomp_filter" || \
11920 ( test -z "$sandbox_arg" && \ 11881 ( test -z "$sandbox_arg" && \
11921 test "x$have_seccomp_filter" = "x1" && \ 11882 test "x$have_seccomp_filter" = "x1" && \
11922 test "x$ac_cv_header_linux_audit_h" = "xyes" && \ 11883 test "x$ac_cv_header_linux_audit_h" = "xyes" && \
@@ -11931,27 +11892,28 @@ elif test "x$sandbox_arg" = "xseccomp_filter" || \
11931 as_fn_error $? "seccomp_filter sandbox requires seccomp headers" "$LINENO" 5 11892 as_fn_error $? "seccomp_filter sandbox requires seccomp headers" "$LINENO" 5
11932 test "x$ac_cv_func_prctl" != "xyes" && \ 11893 test "x$ac_cv_func_prctl" != "xyes" && \
11933 as_fn_error $? "seccomp_filter sandbox requires prctl function" "$LINENO" 5 11894 as_fn_error $? "seccomp_filter sandbox requires prctl function" "$LINENO" 5
11934 SANDBOX_STYLE="seccomp_filter" 11895 SANDBOX_STYLE="$SANDBOX_STYLE seccomp_filter"
11935 11896
11936$as_echo "#define SANDBOX_SECCOMP_FILTER 1" >>confdefs.h 11897$as_echo "#define SANDBOX_SECCOMP_FILTER 1" >>confdefs.h
11937 11898
11938elif test "x$sandbox_arg" = "xrlimit" || \ 11899fi
11900if test "x$sandbox_arg" = "xrlimit" || \
11939 ( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" ) ; then 11901 ( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" ) ; then
11940 test "x$ac_cv_func_setrlimit" != "xyes" && \ 11902 test "x$ac_cv_func_setrlimit" != "xyes" && \
11941 as_fn_error $? "rlimit sandbox requires setrlimit function" "$LINENO" 5 11903 as_fn_error $? "rlimit sandbox requires setrlimit function" "$LINENO" 5
11942 SANDBOX_STYLE="rlimit" 11904 SANDBOX_STYLE="$SANDBOX_STYLE rlimit"
11943 11905
11944$as_echo "#define SANDBOX_RLIMIT 1" >>confdefs.h 11906$as_echo "#define SANDBOX_RLIMIT 1" >>confdefs.h
11945 11907
11946elif test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \ 11908fi
11909if test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \
11947 test "x$sandbox_arg" = "xnone" || test "x$sandbox_arg" = "xnull" ; then 11910 test "x$sandbox_arg" = "xnone" || test "x$sandbox_arg" = "xnull" ; then
11948 SANDBOX_STYLE="none" 11911 SANDBOX_STYLE="$SANDBOX_STYLE none"
11949 11912fi
11950$as_echo "#define SANDBOX_NULL 1" >>confdefs.h 11913if test -z "$SANDBOX_STYLE" ; then
11951
11952else
11953 as_fn_error $? "unsupported --with-sandbox" "$LINENO" 5 11914 as_fn_error $? "unsupported --with-sandbox" "$LINENO" 5
11954fi 11915fi
11916SANDBOX_STYLE="${SANDBOX_STYLE# }"
11955 11917
11956# Cheap hack to ensure NEWS-OS libraries are arranged right. 11918# Cheap hack to ensure NEWS-OS libraries are arranged right.
11957if test ! -z "$SONY" ; then 11919if test ! -z "$SONY" ; then