diff options
author | startx2017 <vradu.startx@yandex.com> | 2020-09-01 09:54:26 -0400 |
---|---|---|
committer | startx2017 <vradu.startx@yandex.com> | 2020-09-01 09:54:26 -0400 |
commit | a5c62dfa5955ad91aa6592c0a5443b93f8432bf3 (patch) | |
tree | 2b5fecafafbc8fafb1cab44d567385da059b483c /configure | |
parent | shell none: avoid syscalls after seccomp_install_filters (diff) | |
download | firejail-a5c62dfa5955ad91aa6592c0a5443b93f8432bf3.tar.gz firejail-a5c62dfa5955ad91aa6592c0a5443b93f8432bf3.tar.zst firejail-a5c62dfa5955ad91aa6592c0a5443b93f8432bf3.zip |
removed --disable-seccomp from ./configure
Diffstat (limited to 'configure')
-rwxr-xr-x | configure | 24 |
1 files changed, 2 insertions, 22 deletions
@@ -624,7 +624,6 @@ ac_includes_default="\ | |||
624 | 624 | ||
625 | ac_subst_vars='LTLIBOBJS | 625 | ac_subst_vars='LTLIBOBJS |
626 | LIBOBJS | 626 | LIBOBJS |
627 | HAVE_SECCOMP_H | ||
628 | EGREP | 627 | EGREP |
629 | GREP | 628 | GREP |
630 | CPP | 629 | CPP |
@@ -641,7 +640,6 @@ HAVE_USERNS | |||
641 | HAVE_NETWORK | 640 | HAVE_NETWORK |
642 | HAVE_GLOBALCFG | 641 | HAVE_GLOBALCFG |
643 | HAVE_CHROOT | 642 | HAVE_CHROOT |
644 | HAVE_SECCOMP | ||
645 | HAVE_PRIVATE_HOME | 643 | HAVE_PRIVATE_HOME |
646 | HAVE_FIRETUNNEL | 644 | HAVE_FIRETUNNEL |
647 | HAVE_OVERLAYFS | 645 | HAVE_OVERLAYFS |
@@ -710,7 +708,6 @@ enable_apparmor | |||
710 | enable_overlayfs | 708 | enable_overlayfs |
711 | enable_firetunnel | 709 | enable_firetunnel |
712 | enable_private_home | 710 | enable_private_home |
713 | enable_seccomp | ||
714 | enable_chroot | 711 | enable_chroot |
715 | enable_globalcfg | 712 | enable_globalcfg |
716 | enable_network | 713 | enable_network |
@@ -1363,7 +1360,6 @@ Optional Features: | |||
1363 | --disable-overlayfs disable overlayfs | 1360 | --disable-overlayfs disable overlayfs |
1364 | --disable-firetunnel disable firetunnel | 1361 | --disable-firetunnel disable firetunnel |
1365 | --disable-private-home disable private home feature | 1362 | --disable-private-home disable private home feature |
1366 | --disable-seccomp disable seccomp | ||
1367 | --disable-chroot disable chroot | 1363 | --disable-chroot disable chroot |
1368 | --disable-globalcfg if the global config file firejail.cfg is not | 1364 | --disable-globalcfg if the global config file firejail.cfg is not |
1369 | present, continue the program using defaults | 1365 | present, continue the program using defaults |
@@ -3537,19 +3533,6 @@ if test "x$enable_private_home" != "xno"; then : | |||
3537 | 3533 | ||
3538 | fi | 3534 | fi |
3539 | 3535 | ||
3540 | HAVE_SECCOMP="" | ||
3541 | # Check whether --enable-seccomp was given. | ||
3542 | if test "${enable_seccomp+set}" = set; then : | ||
3543 | enableval=$enable_seccomp; | ||
3544 | fi | ||
3545 | |||
3546 | if test "x$enable_seccomp" != "xno"; then : | ||
3547 | |||
3548 | HAVE_SECCOMP="-DHAVE_SECCOMP" | ||
3549 | |||
3550 | |||
3551 | fi | ||
3552 | |||
3553 | HAVE_CHROOT="" | 3536 | HAVE_CHROOT="" |
3554 | # Check whether --enable-chroot was given. | 3537 | # Check whether --enable-chroot was given. |
3555 | if test "${enable_chroot+set}" = set; then : | 3538 | if test "${enable_chroot+set}" = set; then : |
@@ -4173,14 +4156,13 @@ fi | |||
4173 | 4156 | ||
4174 | ac_fn_c_check_header_mongrel "$LINENO" "linux/seccomp.h" "ac_cv_header_linux_seccomp_h" "$ac_includes_default" | 4157 | ac_fn_c_check_header_mongrel "$LINENO" "linux/seccomp.h" "ac_cv_header_linux_seccomp_h" "$ac_includes_default" |
4175 | if test "x$ac_cv_header_linux_seccomp_h" = xyes; then : | 4158 | if test "x$ac_cv_header_linux_seccomp_h" = xyes; then : |
4176 | HAVE_SECCOMP_H="-DHAVE_SECCOMP_H" | 4159 | |
4177 | else | 4160 | else |
4178 | HAVE_SECCOMP_H="" | 4161 | as_fn_error $? "*** SECCOMP support is not installed (/usr/include/linux/seccomp.h missing) ***" "$LINENO" 5 |
4179 | fi | 4162 | fi |
4180 | 4163 | ||
4181 | 4164 | ||
4182 | 4165 | ||
4183 | |||
4184 | # set sysconfdir | 4166 | # set sysconfdir |
4185 | if test "$prefix" = /usr; then | 4167 | if test "$prefix" = /usr; then |
4186 | test "$sysconfdir" = '${prefix}/etc' && sysconfdir="/etc" | 4168 | test "$sysconfdir" = '${prefix}/etc' && sysconfdir="/etc" |
@@ -5382,8 +5364,6 @@ echo | |||
5382 | echo "Configuration options:" | 5364 | echo "Configuration options:" |
5383 | echo " prefix: $prefix" | 5365 | echo " prefix: $prefix" |
5384 | echo " sysconfdir: $sysconfdir" | 5366 | echo " sysconfdir: $sysconfdir" |
5385 | echo " seccomp: $HAVE_SECCOMP" | ||
5386 | echo " <linux/seccomp.h>: $HAVE_SECCOMP_H" | ||
5387 | echo " apparmor: $HAVE_APPARMOR" | 5367 | echo " apparmor: $HAVE_APPARMOR" |
5388 | echo " global config: $HAVE_GLOBALCFG" | 5368 | echo " global config: $HAVE_GLOBALCFG" |
5389 | echo " chroot: $HAVE_CHROOT" | 5369 | echo " chroot: $HAVE_CHROOT" |