libseccomp.git
2 years agoMerge version 2.5.4-1+rpi1 and 2.5.4-2 to produce 2.5.4-2+rpi1 archive/raspbian/2.5.4-2+rpi1 raspbian/2.5.4-2+rpi1
Raspbian automatic forward porter [Sat, 11 Nov 2023 02:19:23 +0000 (02:19 +0000)]
Merge version 2.5.4-1+rpi1 and 2.5.4-2 to produce 2.5.4-2+rpi1

2 years agoMerge libseccomp (2.5.4-2) import into refs/heads/workingbranch
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
Merge libseccomp (2.5.4-2) import into refs/heads/workingbranch

2 years agopython_single_version_externally_managed
Kees Cook [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
python_single_version_externally_managed

Fix building with setuptools instead of distutils.

Gbp-Pq: Name python_single_version_externally_managed.patch

2 years ago[PATCH] python: Fix distutils DeprecationWarning
Tom Hromatka [Mon, 21 Mar 2022 17:24:25 +0000 (11:24 -0600)]
[PATCH] python: Fix distutils DeprecationWarning

The python distutils package is deprecated.  Utilize
setuptools and cythonize instead.

./setup.py:26: DeprecationWarning: The distutils
package is deprecated and slated for removal in
Python 3.12. Use setuptools or check PEP 632 [1] for
potential alternatives

[1] https://peps.python.org/pep-0632/

Fixes: https://github.com/seccomp/libseccomp/issues/372
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name python_Fix_distutils_DeprecationWarning.patch

2 years agolibseccomp (2.5.4-2) unstable; urgency=medium
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
libseccomp (2.5.4-2) unstable; urgency=medium

  * Fix watch file. (Closes: #1050659)
  * Dynamically skip autopkgtests when the test runner already applies seccomp
    restrictions.
    - Drop isolation-machine restriction.
  * Fix FTBFS with setuptools. (Closes: #1054788, #1033641)
    - Add python_Fix_distutils_DeprecationWarning.patch
    - Add python_single_version_externally_managed.patch
    - Explicitly build-depend on python3-setuptools

[dgit import unpatched libseccomp 2.5.4-2]

2 years agoImport libseccomp_2.5.4-2.debian.tar.xz
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
Import libseccomp_2.5.4-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.4-2 libseccomp_2.5.4-2.debian.tar.xz]

3 years agoMerge version 2.5.3-2+rpi1 and 2.5.4-1 to produce 2.5.4-1+rpi1 archive/raspbian/2.5.4-1+rpi1 raspbian/2.5.4-1+rpi1
Raspbian automatic forward porter [Wed, 27 Apr 2022 08:18:08 +0000 (09:18 +0100)]
Merge version 2.5.3-2+rpi1 and 2.5.4-1 to produce 2.5.4-1+rpi1

3 years agoMerge libseccomp (2.5.4-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Merge libseccomp (2.5.4-1) import into refs/heads/workingbranch

3 years agoImport libseccomp_2.5.4.orig.tar.gz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (22:23 +0200)]
Import libseccomp_2.5.4.orig.tar.gz

[dgit import orig libseccomp_2.5.4.orig.tar.gz]

3 years agolibseccomp (2.5.4-1) unstable; urgency=medium
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
libseccomp (2.5.4-1) unstable; urgency=medium

  * New upstream release.

[dgit import unpatched libseccomp 2.5.4-1]

3 years agoImport libseccomp_2.5.4.orig.tar.gz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Import libseccomp_2.5.4.orig.tar.gz

[dgit import orig libseccomp_2.5.4.orig.tar.gz]

3 years agoImport libseccomp_2.5.4-1.debian.tar.xz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Import libseccomp_2.5.4-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.4-1 libseccomp_2.5.4-1.debian.tar.xz]

4 years agoMerge version 2.5.2-2+rpi1 and 2.5.3-2 to produce 2.5.3-2+rpi1 archive/raspbian/2.5.3-2+rpi1 raspbian/2.5.3-2+rpi1
Raspbian automatic forward porter [Thu, 25 Nov 2021 00:05:20 +0000 (00:05 +0000)]
Merge version 2.5.2-2+rpi1 and 2.5.3-2 to produce 2.5.3-2+rpi1

4 years agoMerge libseccomp (2.5.3-2) import into refs/heads/workingbranch
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
Merge libseccomp (2.5.3-2) import into refs/heads/workingbranch

4 years agolibseccomp (2.5.3-2) unstable; urgency=medium
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
libseccomp (2.5.3-2) unstable; urgency=medium

  [ Alex Murray ]
  * Fix python version check in debian/rules to properly handle python3.10
    to resolve FTBFS (Closes: #999364)

[dgit import unpatched libseccomp 2.5.3-2]

4 years agoImport libseccomp_2.5.3-2.debian.tar.xz
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
Import libseccomp_2.5.3-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.3-2 libseccomp_2.5.3-2.debian.tar.xz]

4 years agoImport libseccomp_2.5.3.orig.tar.gz
Felix Geyer [Sat, 6 Nov 2021 15:46:51 +0000 (15:46 +0000)]
Import libseccomp_2.5.3.orig.tar.gz

[dgit import orig libseccomp_2.5.3.orig.tar.gz]

4 years agoMerge version 2.5.1-1+rpi1 and 2.5.2-2 to produce 2.5.2-2+rpi1 archive/raspbian/2.5.2-2+rpi1 raspbian/2.5.2-2+rpi1
Raspbian automatic forward porter [Tue, 12 Oct 2021 07:55:59 +0000 (08:55 +0100)]
Merge version 2.5.1-1+rpi1 and 2.5.2-2 to produce 2.5.2-2+rpi1

4 years agoMerge libseccomp (2.5.2-2) import into refs/heads/workingbranch
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
Merge libseccomp (2.5.2-2) import into refs/heads/workingbranch

4 years agorevert_mips_add_multiplexed_syscall_support_to_MIPS
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_mips_add_multiplexed_syscall_support_to_MIPS

REVERTS

From e976080ac5547a46f4654abc710e89bed992bb63 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 23:09:04 -0400
Subject: [PATCH] mips: add multiplexed syscall support to MIPS

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 8e2d449b012647d5f6d6ac86860689ce40e504ae)

Gbp-Pq: Name revert_mips_add_multiplexed_syscall_support_to_MIPS.patch

4 years agorevert_ppc_add_multiplexed_syscall_support_to_PPC
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_ppc_add_multiplexed_syscall_support_to_PPC

REVERTS

From f93a872fbc404df3dd3739dd399ad67f139fb1fa Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 23:21:55 -0400
Subject: [PATCH] ppc: add multiplexed syscall support to PPC

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 255801bccf89343c684b2b94e85d9e0df484c133)

Gbp-Pq: Name revert_ppc_add_multiplexed_syscall_support_to_PPC.patch

4 years agorevert_arch_consolidate_all_of_the_multiplexed_syscall_handling
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_arch_consolidate_all_of_the_multiplexed_syscall_handling

REVERTS

From f454456e261930d94b3a1a444b6bac75c11c3cb0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 4 Aug 2021 11:51:12 -0400
Subject: [PATCH] arch: consolidate all of the multiplexed syscall handling

Not only does this reduce the amount of duplicated code
significantly, it removes a lot of the "magic" numbers in the
code, and it happened to catch some bugs too.

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 17cbd2c253ce63e5e9e3cec867ff58efbe8b5fdc)

Gbp-Pq: Name revert_arch_consolidate_all_of_the_multiplexed_syscall_handling.patch

4 years agorevert_various_additions_to_improve_code_coverage
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_various_additions_to_improve_code_coverage

REVERTS

From aa0f858aa58d51c93a176c60a4c83a4a303bcffd Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 14:12:50 -0400
Subject: [PATCH] tests: various additions to improve code coverage

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit fcc601279004a7f4c2f6ebf766acb4556b0f5e65)

Gbp-Pq: Name revert_various_additions_to_improve_code_coverage.patch

4 years agolibseccomp (2.5.2-2) unstable; urgency=medium
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
libseccomp (2.5.2-2) unstable; urgency=medium

  * Revert mips and powerpc multiplexed syscall handling.
    - Fixes test suite failures. (Closes: #994285)

[dgit import unpatched libseccomp 2.5.2-2]

4 years agoImport libseccomp_2.5.2-2.debian.tar.xz
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
Import libseccomp_2.5.2-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.2-2 libseccomp_2.5.2-2.debian.tar.xz]

4 years agoMerge libseccomp (2.5.2-1) import into refs/heads/workingbranch
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Merge libseccomp (2.5.2-1) import into refs/heads/workingbranch

4 years agoImport libseccomp_2.5.2.orig.tar.gz
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Import libseccomp_2.5.2.orig.tar.gz

[dgit import orig libseccomp_2.5.2.orig.tar.gz]

4 years agolibseccomp (2.5.2-1) unstable; urgency=medium
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
libseccomp (2.5.2-1) unstable; urgency=medium

  * New upstream release.
  * Update watch file.

[dgit import unpatched libseccomp 2.5.2-1]

4 years agoImport libseccomp_2.5.2-1.debian.tar.xz
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Import libseccomp_2.5.2-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.2-1 libseccomp_2.5.2-1.debian.tar.xz]

4 years agoMerge version 2.5.0-3+rpi1 and 2.5.1-1 to produce 2.5.1-1+rpi1 archive/raspbian/2.5.1-1+rpi1 raspbian/2.5.1-1+rpi1
Raspbian automatic forward porter [Tue, 29 Dec 2020 13:41:54 +0000 (13:41 +0000)]
Merge version 2.5.0-3+rpi1 and 2.5.1-1 to produce 2.5.1-1+rpi1

4 years agoMerge libseccomp (2.5.1-1) import into refs/heads/workingbranch
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Merge libseccomp (2.5.1-1) import into refs/heads/workingbranch

4 years agolibseccomp (2.5.1-1) unstable; urgency=medium
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
libseccomp (2.5.1-1) unstable; urgency=medium

  * New upstream release.
  * Drop all patches as they have been applied upstream.

[dgit import unpatched libseccomp 2.5.1-1]

4 years agoImport libseccomp_2.5.1.orig.tar.gz
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Import libseccomp_2.5.1.orig.tar.gz

[dgit import orig libseccomp_2.5.1.orig.tar.gz]

4 years agoImport libseccomp_2.5.1-1.debian.tar.xz
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Import libseccomp_2.5.1-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.1-1 libseccomp_2.5.1-1.debian.tar.xz]

5 years agoMerge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1 archive/raspbian/2.5.0-3+rpi1 raspbian/2.5.0-3+rpi1
Raspbian automatic forward porter [Tue, 17 Nov 2020 18:53:52 +0000 (18:53 +0000)]
Merge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1

5 years agoMerge libseccomp (2.5.0-3) import into refs/heads/workingbranch
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Merge libseccomp (2.5.0-3) import into refs/heads/workingbranch

5 years ago[PATCH] arch: ensure we don't "munge" pseudo syscall numbers
Paul Moore [Sun, 16 Aug 2020 13:56:36 +0000 (09:56 -0400)]
[PATCH] arch: ensure we don't "munge" pseudo syscall numbers

A number of arches/ABIs have either syscall offsets (the MIPS
family) or specific bits (x32) which are applied to their normal
syscall numbers.  We generally handle that via "munging" in
libseccomp, and it works reasonably well.  Unfortunately we were
applying this munging process to the negative pseudo syscall
numbers as well and this was causing problems.

This patch fixes the various offset/bit arches/ABIs by not applying
the munging to the negative pseudo syscall numbers.

This resolves GH issue #284:
* https://github.com/seccomp/libseccomp/issues/284

Reported-by: Harald van Dijk <harald@gigawatt.nl>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 34cde704979defcbddb8eea64295acf0e477c250)

Gbp-Pq: Name arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

5 years ago[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04...
Andreas Schwab [Tue, 18 Aug 2020 13:59:54 +0000 (15:59 +0200)]
[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04 and 06

Architectures like aarch64 and riscv64, and all future architectures that
use the generic syscall table, do not support the open and stat syscalls.
Use the openat and fstat syscalls instead.

Signed-off-by: Andreas Schwab <schwab@suse.de>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit a317fabc1fd915f19f7e7326bf7dcb77493f1210)

Gbp-Pq: Name tests_use_openat_and_fstat_instead_of_open_and_stat_syscalls.patch

5 years ago[PATCH] build: undefine "mips" to prevent build problems for MIPS targets
Paul Moore [Sun, 2 Aug 2020 13:57:39 +0000 (09:57 -0400)]
[PATCH] build: undefine "mips" to prevent build problems for MIPS targets

It turns out that the MIPS GCC compiler defines a "mips" cpp macro
which was resulting in build failures on MIPS so we need to
undefine the "mips" macro during build.  As this should be safe
to do in all architectures, just add it to the compiler flags by
default.

This was reported in the following GH issue:
* https://github.com/seccomp/libseccomp/issues/274

Reported-by: Rongwei Zhang <pudh4418@gmail.com>
Suggested-by: Rongwei Zhang <pudh4418@gmail.com>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 5cd9059618a0810ee47c21e6b44c5a876b75e23d)

Gbp-Pq: Name build_undefine_mips_to_prevent_build_problems.patch

5 years ago[PATCH] system: change our notification fd handling
Paul Moore [Tue, 4 Aug 2020 14:52:08 +0000 (10:52 -0400)]
[PATCH] system: change our notification fd handling

This commit changes how we handle the notification fd by only
requesting it via _NEW_LISTENER if the filter has a _NOTIFY action
in it.  We also augment the seccomp_reset(NULL, ...) behavior so
that it closes the notification fd before resetting the global
state; applications that need to keep their notification fd open
across a call to seccomp_reset(NULL, ...) can simply dup() it.
Although one would have to wonder why the application would be
calling seccomp_reset(NULL, ...) in that case.

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 02812f99e8d1df2e671dac675b4af663d0266303)

Gbp-Pq: Name system_change_our_notification_fd_handling.patch

5 years ago[PATCH] all: only request the userspace notification fd once
Paul Moore [Sun, 26 Jul 2020 15:01:49 +0000 (11:01 -0400)]
[PATCH] all: only request the userspace notification fd once

It turns out that requesting the seccomp userspace notifcation fd
more than once is a bad thing which causes the kernel to complain
(rightfully so for a variety of reasons).  Unfortunately as we were
always requesting the notification fd whenever possible this results
in problems at filter load time.

Our solution is to move the notification fd out of the filter context
and into the global task context, using a newly created task_state
structure.  This allows us to store, and retrieve the notification
outside the scope of an individual filter context.  It also provides
some implementation improvements by giving us a convenient place to
stash all of the API level related support variables.  We also extend
the seccomp_reset() API call to reset this internal global state when
passed a NULL filter context.

There is one potential case which we don't currently handle well:
threads.  At the moment libseccomp is thread ignorant, and that works
well as the only global state up to this point was the currently
supported API level information which was common to all threads in a
process.  Unfortunately, it appears that the notification fd need not
be common to all threads in a process, yet this patch treats it as if
it is common.  I suspect this is a very unusual use case so I decided
to keep this patch simple and ignore this case, but in the future if
we need to support this properly we should be able to do so without
API changes by keeping an internal list of notification fds indexed
by gettid(2).

This fixes the GitHub issue below:
* https://github.com/seccomp/libseccomp/issues/273

Reported-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit ce314fe4111887c593e3c6b17c60d93bc6ab66b9)

Gbp-Pq: Name all_only_request_the_userspace_notification_fd_once.patch

5 years agolibseccomp (2.5.0-3) unstable; urgency=medium
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
libseccomp (2.5.0-3) unstable; urgency=medium

  * Cherry-pick patch from the 2.5 branch to fix test error on mips:
    - arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

[dgit import unpatched libseccomp 2.5.0-3]

5 years agoImport libseccomp_2.5.0-3.debian.tar.xz
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Import libseccomp_2.5.0-3.debian.tar.xz

[dgit import tarball libseccomp 2.5.0-3 libseccomp_2.5.0-3.debian.tar.xz]

5 years agoImport libseccomp_2.5.0.orig.tar.gz
Felix Geyer [Sat, 24 Oct 2020 11:58:28 +0000 (12:58 +0100)]
Import libseccomp_2.5.0.orig.tar.gz

[dgit import orig libseccomp_2.5.0.orig.tar.gz]

5 years agoMerge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1 archive/raspbian/2.4.4-1+rpi1 raspbian/2.4.4-1+rpi1
Raspbian automatic forward porter [Mon, 28 Sep 2020 10:25:35 +0000 (11:25 +0100)]
Merge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1

5 years agoMerge libseccomp (2.4.4-1) import into refs/heads/workingbranch
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Merge libseccomp (2.4.4-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.4-1) unstable; urgency=medium
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
libseccomp (2.4.4-1) unstable; urgency=medium

  * Team upload.

  [ Debian Janitor ]
  * Set upstream metadata fields: Repository, Repository-Browse.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository.

  [ Felix Geyer ]
  * New upstream release.
  * Download and verify orig gpg signature.

[dgit import unpatched libseccomp 2.4.4-1]

5 years agoImport libseccomp_2.4.4.orig.tar.gz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4.orig.tar.gz

[dgit import orig libseccomp_2.4.4.orig.tar.gz]

5 years agoImport libseccomp_2.4.4-1.debian.tar.xz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.4-1 libseccomp_2.4.4-1.debian.tar.xz]

5 years agoMerge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1 archive/raspbian/2.4.3-1+rpi1 raspbian/2.4.3-1+rpi1
Raspbian automatic forward porter [Wed, 18 Mar 2020 12:08:04 +0000 (12:08 +0000)]
Merge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1

5 years agoMerge libseccomp (2.4.3-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Merge libseccomp (2.4.3-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.3-1) unstable; urgency=medium
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
libseccomp (2.4.3-1) unstable; urgency=medium

  * New upstream release.
  * Drop patches that have been applied upstream:
    - tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch
    - api_define__SNR_ppoll_again.patch
  * Cherry-pick support for the riscv64 architecture. (Closes: #952386)
    - Add riscv64_support.patch

[dgit import unpatched libseccomp 2.4.3-1]

5 years agoImport libseccomp_2.4.3.orig.tar.gz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3.orig.tar.gz

[dgit import orig libseccomp_2.4.3.orig.tar.gz]

5 years agoImport libseccomp_2.4.3-1.debian.tar.xz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.3-1 libseccomp_2.4.3-1.debian.tar.xz]

6 years agoMerge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1 archive/raspbian/2.4.2-2+rpi1 raspbian/2.4.2-2+rpi1
Raspbian automatic forward porter [Thu, 5 Dec 2019 18:50:36 +0000 (18:50 +0000)]
Merge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1

6 years agoMerge libseccomp (2.4.2-2) import into refs/heads/workingbranch
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Merge libseccomp (2.4.2-2) import into refs/heads/workingbranch

6 years agoapi_define__SNR_ppoll_again
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
api_define__SNR_ppoll_again

From 2e54815cd843687d750cc9822f992389bb7b76cd Mon Sep 17 00:00:00 2001
From: Miroslav Lichvar <mlichvar@redhat.com>
Date: Wed, 13 Nov 2019 13:36:10 +0100
Subject: [PATCH] api: define __SNR_ppoll again

Commit bf747eb21e428c2b3ead6ebcca27951b681963a0 accidentally removed the
__SNR_ppoll definition. Add it back, using a PNR value if disabled in
the kernel headers.

Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com>
Gbp-Pq: Name api_define__SNR_ppoll_again.patch

6 years agocython3
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
cython3

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

6 years agotests: rely on __SNR_xxx instead of __NR_xxx for syscalls
Paul Moore [Tue, 5 Nov 2019 20:11:11 +0000 (15:11 -0500)]
tests: rely on __SNR_xxx instead of __NR_xxx for syscalls

We recently changed how libseccomp handles syscall numbers that are
not defined natively, but we missed test #15.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Note: Tagged for v2.5, but needed to build 2.4.2 with newer kernels on arm
This is part of PR: https://github.com/seccomp/libseccomp/pull/182
Upstream Bug: https://github.com/seccomp/libseccomp/issues/184
Origin: upstream, https://github.com/pcmoore/misc-libseccomp/commit/35803ceb43c453762a3ab5177c5f8d5dbb813478
Bug-Ubuntu: https://bugs.launchpad.net/bugs/1849785
Last-Update: 2019-11-12

Gbp-Pq: Name tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch

6 years agolibseccomp (2.4.2-2) unstable; urgency=medium
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
libseccomp (2.4.2-2) unstable; urgency=medium

  [ Christian Ehrhardt ]
  * d/rules: fix potential FTFBS after full python3 switch
  * d/t/control: drop python2 test following the removal of the package

  [ Felix Geyer ]
  * Remove build-dependency on valgrind for mips64el as it's broken there.
  * Backport patch to define __SNR_ppoll again.
    - Add api_define__SNR_ppoll_again.patch
  * Replace custom patch for cython3 with the upstream fix.

[dgit import unpatched libseccomp 2.4.2-2]

6 years agoImport libseccomp_2.4.2-2.debian.tar.xz
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Import libseccomp_2.4.2-2.debian.tar.xz

[dgit import tarball libseccomp 2.4.2-2 libseccomp_2.4.2-2.debian.tar.xz]

6 years agoImport libseccomp_2.4.2.orig.tar.gz
Felix Geyer [Tue, 12 Nov 2019 23:00:49 +0000 (23:00 +0000)]
Import libseccomp_2.4.2.orig.tar.gz

[dgit import orig libseccomp_2.4.2.orig.tar.gz]

6 years agoMerge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
Merge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch

6 years agopython_install_dir
Kees Cook [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
python_install_dir

From 830929096665eab2b910d676ccab1df90908cb02 Mon Sep 17 00:00:00 2001
From: Felix Geyer <debfx@fobos.de>
Date: Mon, 15 Jul 2019 21:12:05 +0200
Subject: [PATCH] Install the python extension to the root package dir

Commit 8ad3638ea9023c3948976dfadebd1554380a31c9 effectively added libseccomp/
to the install path of the python extension.
This changed the import module name from "seccomp" to "libseccomp.seccomp",
breaking existing users.

Revert the install path like it was before 2.4.0

Signed-off-by: Felix Geyer <debfx@fobos.de>
Gbp-Pq: Name python_install_dir.patch

6 years agolibseccomp (2.4.1-2+rpi1) bullseye-staging; urgency=medium
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
libseccomp (2.4.1-2+rpi1) bullseye-staging; urgency=medium

  * Move valigrind from build-depends to build-conflicts, raspbians valgrind
    is somewhat broken and causes testsuite failures.

[dgit import unpatched libseccomp 2.4.1-2+rpi1]

6 years agoImport libseccomp_2.4.1-2+rpi1.debian.tar.xz
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
Import libseccomp_2.4.1-2+rpi1.debian.tar.xz

[dgit import tarball libseccomp 2.4.1-2+rpi1 libseccomp_2.4.1-2+rpi1.debian.tar.xz]

6 years agoMerge libseccomp (2.4.1-2) import into refs/heads/workingbranch
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
Merge libseccomp (2.4.1-2) import into refs/heads/workingbranch

6 years agopython_install_dir
Kees Cook [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
python_install_dir

From 830929096665eab2b910d676ccab1df90908cb02 Mon Sep 17 00:00:00 2001
From: Felix Geyer <debfx@fobos.de>
Date: Mon, 15 Jul 2019 21:12:05 +0200
Subject: [PATCH] Install the python extension to the root package dir

Commit 8ad3638ea9023c3948976dfadebd1554380a31c9 effectively added libseccomp/
to the install path of the python extension.
This changed the import module name from "seccomp" to "libseccomp.seccomp",
breaking existing users.

Revert the install path like it was before 2.4.0

Signed-off-by: Felix Geyer <debfx@fobos.de>
Gbp-Pq: Name python_install_dir.patch

6 years agolibseccomp (2.4.1-2) unstable; urgency=medium
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
libseccomp (2.4.1-2) unstable; urgency=medium

  * Remove build-dependency on valgrind for mipsel and x32 as it's broken
    on those archs.
  * Set Rules-Requires-Root: no.

[dgit import unpatched libseccomp 2.4.1-2]

6 years agoImport libseccomp_2.4.1-2.debian.tar.xz
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
Import libseccomp_2.4.1-2.debian.tar.xz

[dgit import tarball libseccomp 2.4.1-2 libseccomp_2.4.1-2.debian.tar.xz]

6 years agoImport libseccomp_2.4.1.orig.tar.gz
Felix Geyer [Wed, 17 Jul 2019 21:23:28 +0000 (22:23 +0100)]
Import libseccomp_2.4.1.orig.tar.gz

[dgit import orig libseccomp_2.4.1.orig.tar.gz]

6 years agoMerge libseccomp (2.3.3-4) import into refs/heads/workingbranch
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
Merge libseccomp (2.3.3-4) import into refs/heads/workingbranch

6 years agoparisc_syscalls_linux415
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux415

Gbp-Pq: Name 31-parisc_syscalls_linux415.patch

6 years agoparisc_syscalls_linux414
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux414

Gbp-Pq: Name 30-parisc_syscalls_linux414.patch

6 years agoparisc_syscalls_linux49
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux49

Gbp-Pq: Name 29-parisc_syscalls_linux49.patch

6 years agoarch: Add parisc architecture support
Helge Deller [Wed, 25 May 2016 14:53:39 +0000 (16:53 +0200)]
arch: Add parisc architecture support

This patch (v4) adds support for the parisc and parisc64 architectures
to libseccomp.

I didn't split up the patch, because it's pretty trivial.
Those parisc-specific files gets added:
 src/arch-parisc-syscalls.c
 src/arch-parisc.c
 src/arch-parisc.h
 src/arch-parisc64.c

All other changes are trivial because they simply add parisc-specific
case statements in variouse switch statements.

I did ran a "make check" on x86-64 and parisc and all testcases succeeded.
All live testcases succeed as well when running "./regression -T live".

The patch applies cleanly to current libseccomp git head.

Changes between v4 and v3 of this patch:
- Added parisc arch to arch-syscall-check.c and fixup syscall table as
  needed
- Fixed copyright notices in parisc files as suggested by Mike Frysinger

Changes between v3 and v2 of this patch:
- Stripped out patch which reports if a check was skipped because
  valgrind isn't installed.
- Added tuxcall pseudo syscall for 19-sim-missing_syscalls testcase
- Added sysmips pseudo syscall for 29-sim-pseudo_syscall testcase

Changes between v2 and v1 of this patch:
- Enabled seccomp mode 2 regression tests on parisc. Kernel support for
  hppa was added in kernel 4.6-rc1 and backported into the kernel v4.5.2
  stable series.

Signed-off-by: Helge Deller <deller@gmx.de>
[PM: corrected a number or errors from 'make check-syntax']
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name 28-parisc_support.patch

6 years agolibseccomp (2.3.3-4) unstable; urgency=medium
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
libseccomp (2.3.3-4) unstable; urgency=medium

  [ Ondřej Nový ]
  * d/copyright: Change Format URL to correct one

  [ Helmut Grohne ]
  * Fix FTCBFS: (Closes: #903556)
    + Multiarchify python Build-Depends.
    + Annotate cython dependencies with :native for now.
    + Drop noop dh_auto_build invocations.
    + Pass a suitable PYTHONPATH for python2.
    + Pass _PYTHON_SYSCONFIGDATA_NAME for python3.

[dgit import unpatched libseccomp 2.3.3-4]

6 years agoImport libseccomp_2.3.3-4.debian.tar.xz
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
Import libseccomp_2.3.3-4.debian.tar.xz

[dgit import tarball libseccomp 2.3.3-4 libseccomp_2.3.3-4.debian.tar.xz]

7 years agoImport libseccomp_2.3.3.orig.tar.gz
Felix Geyer [Sun, 22 Apr 2018 21:55:03 +0000 (22:55 +0100)]
Import libseccomp_2.3.3.orig.tar.gz

[dgit import orig libseccomp_2.3.3.orig.tar.gz]

11 years agobuild-ldflags
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
build-ldflags

Gbp-Pq: Name build-ldflags.patch

11 years agomanpage-typo
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
manpage-typo

Gbp-Pq: Name manpage-typo.patch

11 years agopkgconfig-macro
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
pkgconfig-macro

Gbp-Pq: Name pkgconfig-macro.patch

11 years agolibseccomp (2.1.1-1) unstable; urgency=low
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
libseccomp (2.1.1-1) unstable; urgency=low

  * New upstream release (Closes: 733293).
  * copyright: add a few missed people.
  * rules: adjusted for new test target.
  * libseccomp2.symbols: drop accidentally exported functions.
  * control:
    - bump standards, no changes needed.
    - add armel target

[dgit import unpatched libseccomp 2.1.1-1]

11 years agoImport libseccomp_2.1.1.orig.tar.gz
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
Import libseccomp_2.1.1.orig.tar.gz

[dgit import orig libseccomp_2.1.1.orig.tar.gz]

11 years agoImport libseccomp_2.1.1-1.debian.tar.xz
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
Import libseccomp_2.1.1-1.debian.tar.xz

[dgit import tarball libseccomp 2.1.1-1 libseccomp_2.1.1-1.debian.tar.xz]