diff options
Diffstat (limited to 'recipes-containers/lxc/files/configure-skip-libseccomp-tests-if-it-is-disabled.patch')
| -rw-r--r-- | recipes-containers/lxc/files/configure-skip-libseccomp-tests-if-it-is-disabled.patch | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/recipes-containers/lxc/files/configure-skip-libseccomp-tests-if-it-is-disabled.patch b/recipes-containers/lxc/files/configure-skip-libseccomp-tests-if-it-is-disabled.patch new file mode 100644 index 00000000..7ba992f6 --- /dev/null +++ b/recipes-containers/lxc/files/configure-skip-libseccomp-tests-if-it-is-disabled.patch | |||
| @@ -0,0 +1,51 @@ | |||
| 1 | From 67cd8bde2d46983df8fa9f647e9fc0b96370ec29 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Eneas U de Queiroz <cotequeiroz@gmail.com> | ||
| 3 | Date: Sat, 16 Jan 2021 13:54:07 -0300 | ||
| 4 | Subject: [PATCH] configure: skip libseccomp tests if it is disabled | ||
| 5 | |||
| 6 | Move the block checking for libseccomp api compatibility inside | ||
| 7 | AM_COND_IF([ENABLE_SECCOMP] ... ). | ||
| 8 | |||
| 9 | Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> | ||
| 10 | --- | ||
| 11 | configure.ac | 17 ++++++++--------- | ||
| 12 | 1 file changed, 8 insertions(+), 9 deletions(-) | ||
| 13 | |||
| 14 | diff --git a/configure.ac b/configure.ac | ||
| 15 | index f58487f5d..ce6363136 100644 | ||
| 16 | --- a/configure.ac | ||
| 17 | +++ b/configure.ac | ||
| 18 | @@ -312,6 +312,14 @@ AM_COND_IF([ENABLE_SECCOMP], | ||
| 19 | AC_CHECK_LIB([seccomp], [seccomp_init],[],[AC_MSG_ERROR([You must install the seccomp development package in order to compile lxc])]) | ||
| 20 | AC_SUBST([SECCOMP_LIBS], [-lseccomp]) | ||
| 21 | ]) | ||
| 22 | + # HAVE_SCMP_FILTER_CTX=1 will tell us we have libseccomp api >= 1.0.0 | ||
| 23 | + OLD_CFLAGS="$CFLAGS" | ||
| 24 | + CFLAGS="$CFLAGS $SECCOMP_CFLAGS" | ||
| 25 | + AC_CHECK_TYPES([scmp_filter_ctx], [], [], [[#include <seccomp.h>]]) | ||
| 26 | + AC_CHECK_DECLS([seccomp_notify_fd], [], [], [[#include <seccomp.h>]]) | ||
| 27 | + AC_CHECK_TYPES([struct seccomp_notif_sizes], [], [], [[#include <seccomp.h>]]) | ||
| 28 | + AC_CHECK_DECLS([seccomp_syscall_resolve_name_arch], [], [], [[#include <seccomp.h>]]) | ||
| 29 | + CFLAGS="$OLD_CFLAGS" | ||
| 30 | ]) | ||
| 31 | |||
| 32 | AC_MSG_CHECKING(for static libcap) | ||
| 33 | @@ -359,15 +367,6 @@ AM_COND_IF([ENABLE_CAP], | ||
| 34 | AC_CHECK_LIB(cap,cap_get_file, AC_DEFINE(LIBCAP_SUPPORTS_FILE_CAPABILITIES,1,[Have cap_get_file]),[],[]) | ||
| 35 | AC_SUBST([CAP_LIBS], [-lcap])]) | ||
| 36 | |||
| 37 | -# HAVE_SCMP_FILTER_CTX=1 will tell us we have libseccomp api >= 1.0.0 | ||
| 38 | -OLD_CFLAGS="$CFLAGS" | ||
| 39 | -CFLAGS="$CFLAGS $SECCOMP_CFLAGS" | ||
| 40 | -AC_CHECK_TYPES([scmp_filter_ctx], [], [], [[#include <seccomp.h>]]) | ||
| 41 | -AC_CHECK_DECLS([seccomp_notify_fd], [], [], [[#include <seccomp.h>]]) | ||
| 42 | -AC_CHECK_TYPES([struct seccomp_notif_sizes], [], [], [[#include <seccomp.h>]]) | ||
| 43 | -AC_CHECK_DECLS([seccomp_syscall_resolve_name_arch], [], [], [[#include <seccomp.h>]]) | ||
| 44 | -CFLAGS="$OLD_CFLAGS" | ||
| 45 | - | ||
| 46 | AC_CHECK_HEADERS([linux/bpf.h], [ | ||
| 47 | AC_CHECK_TYPES([struct bpf_cgroup_dev_ctx], [], [], [[#include <linux/bpf.h>]]) | ||
| 48 | ], [], []) | ||
| 49 | -- | ||
| 50 | 2.17.1 | ||
| 51 | |||
