qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] [PATCH] configure: Relax check for libseccomp


From: Helge Deller
Subject: Re: [Qemu-devel] [PATCH] configure: Relax check for libseccomp
Date: Wed, 3 Apr 2019 17:55:04 +0200
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1

On 03.04.19 17:16, Peter Maydell wrote:
> On Wed, 3 Apr 2019 at 19:51, Helge Deller <address@hidden> wrote:
>
> [cc'ing Eduardo as the seccomp submaintainer]
>
>> On a non-release architecture, the configure program aborts if the
>> --enable-seccomp flag was given (with no way to work around it on the
>> command line):
>>
>> ERROR: User requested feature libseccomp
>>         configure was not able to find it.
>>         libseccomp is not supported for host cpu parisc64
>
> Surely the workaround is "don't pass --enable-seccomp on
> the configure command line" ?

Sure, that's the easy solution but doesn't work for me.
The only reason why I come up with this patch, is that
on Debian the qemu package fails to build on parisc because
of this issue, as can be seen here:
https://buildd.debian.org/status/logs.php?pkg=qemu&arch=hppa
Debian sets the -enable-seccomp flags, so it fails on parisc
(already in the qemu 1.3 release).
> Our general approach with configure arguments is:
>  --disable-foo means "don't try to look for or use foo"
>  --enable-foo means "use foo, and stop with an error if we can't use
>      foo for any reason (eg not found, version too old)"

Yes, that's OK.

> passing nothing means "look for foo, use it if we can,
>      but if we can't then just silently don't use foo"
>
> So I think if the user specifically asks us to use seccomp on a
> host architecture where it won't work then configure should fail.

True, it should fail if it's not useable.
But In my case, latest libseccomp is avaialble & functional, but
nevertheless configure fails because parisc is not in the white list.

> Is the underlying problem here:
>  * we use a whitelist of host architectures to enable seccomp for
>    and we should not do that (eg blacklist instead, or just allow it
>    for any host architecture)?

Yes, that's one option.
My patch partly does that by allowing -enble-seccomp as long as a
libseccomp package is found.

>  * using a whitelist is ok, but we should add some more host archs to it?

I think for non-release architectures there is no need to be too strict.
If something is available, just use it, independend of the architecture.
This solves it not just for parisc...

I'm fine with any solution as long as it works :-)

> What particular host arch are you using?

You already found out in your other mail: hppa/parisc.

Helge



reply via email to

[Prev in Thread] Current Thread [Next in Thread]