summaryrefslogtreecommitdiff
path: root/debian/patches/revert-x32-sandbox-breakage.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches/revert-x32-sandbox-breakage.patch')
-rw-r--r--debian/patches/revert-x32-sandbox-breakage.patch39
1 files changed, 39 insertions, 0 deletions
diff --git a/debian/patches/revert-x32-sandbox-breakage.patch b/debian/patches/revert-x32-sandbox-breakage.patch
new file mode 100644
index 000000000..32cff92d7
--- /dev/null
+++ b/debian/patches/revert-x32-sandbox-breakage.patch
@@ -0,0 +1,39 @@
1From 67434174b3d64b352a794275f77489ebf1575849 Mon Sep 17 00:00:00 2001
2From: Colin Watson <cjwatson@debian.org>
3Date: Mon, 26 Oct 2020 17:36:22 +0000
4Subject: Revert "detect Linux/X32 systems"
5
6This reverts commit 5b56bd0affea7b02b540bdbc4d1d271b0e4fc885. The bug
7reporter wasn't actually using x32, but rather an ordinary 32-bit
8userspace on a 64-bit kernel; this patch broke the seccomp sandbox on
9the actual x32 architecture.
10
11Patch-Name: revert-x32-sandbox-breakage.patch
12---
13 configure.ac | 6 ------
14 1 file changed, 6 deletions(-)
15
16diff --git a/configure.ac b/configure.ac
17index 5944299fa..15fc0d653 100644
18--- a/configure.ac
19+++ b/configure.ac
20@@ -521,8 +521,6 @@ SPP_MSG="no"
21 # the --with-solaris-privs option and --with-sandbox=solaris).
22 SOLARIS_PRIVS="no"
23
24-AC_CHECK_SIZEOF([size_t])
25-
26 # Check for some target-specific stuff
27 case "$host" in
28 *-*-aix*)
29@@ -891,10 +889,6 @@ main() { if (NSVersionOfRunTimeLibrary("System") >= (60 << 16))
30 case "$host" in
31 x86_64-*)
32 seccomp_audit_arch=AUDIT_ARCH_X86_64
33- # X32: AMD64 instructions in 32bit address space.
34- if test "x$ac_cv_sizeof_size_t" = "x4" ; then
35- seccomp_audit_arch=AUDIT_ARCH_I386
36- fi
37 ;;
38 i*86-*)
39 seccomp_audit_arch=AUDIT_ARCH_I386