summaryrefslogtreecommitdiffstats
path: root/configure.ac
diff options
context:
space:
mode:
authorChuck Lever <chuck.lever@oracle.com>2010-01-14 12:24:34 -0500
committerSteve Dickson <steved@redhat.com>2010-01-15 14:55:52 -0500
commite2446fda6e7cdb1b9462162b81b0e50fd6efaf56 (patch)
treef1a6bedafb0fc506cc0cccd8848a13d421a70afb /configure.ac
parentd16bd0400fc096ec2fed36d5dfa8620b2370e4d1 (diff)
downloadnfs-utils-e2446fda6e7cdb1b9462162b81b0e50fd6efaf56.tar.gz
nfs-utils-e2446fda6e7cdb1b9462162b81b0e50fd6efaf56.tar.xz
nfs-utils-e2446fda6e7cdb1b9462162b81b0e50fd6efaf56.zip
libnsm.a: retain CAP_NET_BIND when dropping privileges
I'm about to switch the order of listener creation and dropping root privileges. rpc.statd will drop privileges first, then create its listeners. The reason for the new ordering is explained in a subsequent patch. However, for non-TI-RPC builds, rpc_init() needs to use a privileged port to do pmap registrations. For both TI-RPC and non-TI-RPC builds, CAP_NET_BIND is required in case the admin requests a privileged listener port on the statd command line. So that these requirements are met, nsm_drop_privileges() will now retain CAP_NET_BIND while dropping root. Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Diffstat (limited to 'configure.ac')
-rw-r--r--configure.ac3
1 files changed, 3 insertions, 0 deletions
diff --git a/configure.ac b/configure.ac
index ea6f4d9..c77c5ba 100644
--- a/configure.ac
+++ b/configure.ac
@@ -166,6 +166,9 @@ fi
dnl Check for TI-RPC library and headers
AC_LIBTIRPC
+dnl Check for -lcap
+AC_LIBCAP
+
# Check whether user wants TCP wrappers support
AC_TCP_WRAPPERS