libseccomp.git
5 years agoMerge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1 archive/raspbian/2.5.0-3+rpi1 raspbian/2.5.0-3+rpi1
Raspbian automatic forward porter [Tue, 17 Nov 2020 18:53:52 +0000 (18:53 +0000)]
Merge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1

5 years agoMerge libseccomp (2.5.0-3) import into refs/heads/workingbranch
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Merge libseccomp (2.5.0-3) import into refs/heads/workingbranch

5 years ago[PATCH] arch: ensure we don't "munge" pseudo syscall numbers
Paul Moore [Sun, 16 Aug 2020 13:56:36 +0000 (09:56 -0400)]
[PATCH] arch: ensure we don't "munge" pseudo syscall numbers

A number of arches/ABIs have either syscall offsets (the MIPS
family) or specific bits (x32) which are applied to their normal
syscall numbers.  We generally handle that via "munging" in
libseccomp, and it works reasonably well.  Unfortunately we were
applying this munging process to the negative pseudo syscall
numbers as well and this was causing problems.

This patch fixes the various offset/bit arches/ABIs by not applying
the munging to the negative pseudo syscall numbers.

This resolves GH issue #284:
* https://github.com/seccomp/libseccomp/issues/284

Reported-by: Harald van Dijk <harald@gigawatt.nl>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 34cde704979defcbddb8eea64295acf0e477c250)

Gbp-Pq: Name arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

5 years ago[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04...
Andreas Schwab [Tue, 18 Aug 2020 13:59:54 +0000 (15:59 +0200)]
[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04 and 06

Architectures like aarch64 and riscv64, and all future architectures that
use the generic syscall table, do not support the open and stat syscalls.
Use the openat and fstat syscalls instead.

Signed-off-by: Andreas Schwab <schwab@suse.de>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit a317fabc1fd915f19f7e7326bf7dcb77493f1210)

Gbp-Pq: Name tests_use_openat_and_fstat_instead_of_open_and_stat_syscalls.patch

5 years ago[PATCH] build: undefine "mips" to prevent build problems for MIPS targets
Paul Moore [Sun, 2 Aug 2020 13:57:39 +0000 (09:57 -0400)]
[PATCH] build: undefine "mips" to prevent build problems for MIPS targets

It turns out that the MIPS GCC compiler defines a "mips" cpp macro
which was resulting in build failures on MIPS so we need to
undefine the "mips" macro during build.  As this should be safe
to do in all architectures, just add it to the compiler flags by
default.

This was reported in the following GH issue:
* https://github.com/seccomp/libseccomp/issues/274

Reported-by: Rongwei Zhang <pudh4418@gmail.com>
Suggested-by: Rongwei Zhang <pudh4418@gmail.com>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 5cd9059618a0810ee47c21e6b44c5a876b75e23d)

Gbp-Pq: Name build_undefine_mips_to_prevent_build_problems.patch

5 years ago[PATCH] system: change our notification fd handling
Paul Moore [Tue, 4 Aug 2020 14:52:08 +0000 (10:52 -0400)]
[PATCH] system: change our notification fd handling

This commit changes how we handle the notification fd by only
requesting it via _NEW_LISTENER if the filter has a _NOTIFY action
in it.  We also augment the seccomp_reset(NULL, ...) behavior so
that it closes the notification fd before resetting the global
state; applications that need to keep their notification fd open
across a call to seccomp_reset(NULL, ...) can simply dup() it.
Although one would have to wonder why the application would be
calling seccomp_reset(NULL, ...) in that case.

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 02812f99e8d1df2e671dac675b4af663d0266303)

Gbp-Pq: Name system_change_our_notification_fd_handling.patch

5 years ago[PATCH] all: only request the userspace notification fd once
Paul Moore [Sun, 26 Jul 2020 15:01:49 +0000 (11:01 -0400)]
[PATCH] all: only request the userspace notification fd once

It turns out that requesting the seccomp userspace notifcation fd
more than once is a bad thing which causes the kernel to complain
(rightfully so for a variety of reasons).  Unfortunately as we were
always requesting the notification fd whenever possible this results
in problems at filter load time.

Our solution is to move the notification fd out of the filter context
and into the global task context, using a newly created task_state
structure.  This allows us to store, and retrieve the notification
outside the scope of an individual filter context.  It also provides
some implementation improvements by giving us a convenient place to
stash all of the API level related support variables.  We also extend
the seccomp_reset() API call to reset this internal global state when
passed a NULL filter context.

There is one potential case which we don't currently handle well:
threads.  At the moment libseccomp is thread ignorant, and that works
well as the only global state up to this point was the currently
supported API level information which was common to all threads in a
process.  Unfortunately, it appears that the notification fd need not
be common to all threads in a process, yet this patch treats it as if
it is common.  I suspect this is a very unusual use case so I decided
to keep this patch simple and ignore this case, but in the future if
we need to support this properly we should be able to do so without
API changes by keeping an internal list of notification fds indexed
by gettid(2).

This fixes the GitHub issue below:
* https://github.com/seccomp/libseccomp/issues/273

Reported-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit ce314fe4111887c593e3c6b17c60d93bc6ab66b9)

Gbp-Pq: Name all_only_request_the_userspace_notification_fd_once.patch

5 years agolibseccomp (2.5.0-3) unstable; urgency=medium
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
libseccomp (2.5.0-3) unstable; urgency=medium

  * Cherry-pick patch from the 2.5 branch to fix test error on mips:
    - arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

[dgit import unpatched libseccomp 2.5.0-3]

5 years agoImport libseccomp_2.5.0-3.debian.tar.xz
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Import libseccomp_2.5.0-3.debian.tar.xz

[dgit import tarball libseccomp 2.5.0-3 libseccomp_2.5.0-3.debian.tar.xz]

5 years agoImport libseccomp_2.5.0.orig.tar.gz
Felix Geyer [Sat, 24 Oct 2020 11:58:28 +0000 (12:58 +0100)]
Import libseccomp_2.5.0.orig.tar.gz

[dgit import orig libseccomp_2.5.0.orig.tar.gz]

5 years agoMerge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1 archive/raspbian/2.4.4-1+rpi1 raspbian/2.4.4-1+rpi1
Raspbian automatic forward porter [Mon, 28 Sep 2020 10:25:35 +0000 (11:25 +0100)]
Merge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1

5 years agoMerge libseccomp (2.4.4-1) import into refs/heads/workingbranch
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Merge libseccomp (2.4.4-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.4-1) unstable; urgency=medium
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
libseccomp (2.4.4-1) unstable; urgency=medium

  * Team upload.

  [ Debian Janitor ]
  * Set upstream metadata fields: Repository, Repository-Browse.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository.

  [ Felix Geyer ]
  * New upstream release.
  * Download and verify orig gpg signature.

[dgit import unpatched libseccomp 2.4.4-1]

5 years agoImport libseccomp_2.4.4.orig.tar.gz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4.orig.tar.gz

[dgit import orig libseccomp_2.4.4.orig.tar.gz]

5 years agoImport libseccomp_2.4.4-1.debian.tar.xz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.4-1 libseccomp_2.4.4-1.debian.tar.xz]

5 years agoMerge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1 archive/raspbian/2.4.3-1+rpi1 raspbian/2.4.3-1+rpi1
Raspbian automatic forward porter [Wed, 18 Mar 2020 12:08:04 +0000 (12:08 +0000)]
Merge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1

5 years agoMerge libseccomp (2.4.3-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Merge libseccomp (2.4.3-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.3-1) unstable; urgency=medium
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
libseccomp (2.4.3-1) unstable; urgency=medium

  * New upstream release.
  * Drop patches that have been applied upstream:
    - tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch
    - api_define__SNR_ppoll_again.patch
  * Cherry-pick support for the riscv64 architecture. (Closes: #952386)
    - Add riscv64_support.patch

[dgit import unpatched libseccomp 2.4.3-1]

5 years agoImport libseccomp_2.4.3.orig.tar.gz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3.orig.tar.gz

[dgit import orig libseccomp_2.4.3.orig.tar.gz]

5 years agoImport libseccomp_2.4.3-1.debian.tar.xz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.3-1 libseccomp_2.4.3-1.debian.tar.xz]

6 years agoMerge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1 archive/raspbian/2.4.2-2+rpi1 raspbian/2.4.2-2+rpi1
Raspbian automatic forward porter [Thu, 5 Dec 2019 18:50:36 +0000 (18:50 +0000)]
Merge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1

6 years agoMerge libseccomp (2.4.2-2) import into refs/heads/workingbranch
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Merge libseccomp (2.4.2-2) import into refs/heads/workingbranch

6 years agoapi_define__SNR_ppoll_again
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
api_define__SNR_ppoll_again

From 2e54815cd843687d750cc9822f992389bb7b76cd Mon Sep 17 00:00:00 2001
From: Miroslav Lichvar <mlichvar@redhat.com>
Date: Wed, 13 Nov 2019 13:36:10 +0100
Subject: [PATCH] api: define __SNR_ppoll again

Commit bf747eb21e428c2b3ead6ebcca27951b681963a0 accidentally removed the
__SNR_ppoll definition. Add it back, using a PNR value if disabled in
the kernel headers.

Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com>
Gbp-Pq: Name api_define__SNR_ppoll_again.patch

6 years agocython3
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
cython3

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

6 years agotests: rely on __SNR_xxx instead of __NR_xxx for syscalls
Paul Moore [Tue, 5 Nov 2019 20:11:11 +0000 (15:11 -0500)]
tests: rely on __SNR_xxx instead of __NR_xxx for syscalls

We recently changed how libseccomp handles syscall numbers that are
not defined natively, but we missed test #15.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Note: Tagged for v2.5, but needed to build 2.4.2 with newer kernels on arm
This is part of PR: https://github.com/seccomp/libseccomp/pull/182
Upstream Bug: https://github.com/seccomp/libseccomp/issues/184
Origin: upstream, https://github.com/pcmoore/misc-libseccomp/commit/35803ceb43c453762a3ab5177c5f8d5dbb813478
Bug-Ubuntu: https://bugs.launchpad.net/bugs/1849785
Last-Update: 2019-11-12

Gbp-Pq: Name tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch

6 years agolibseccomp (2.4.2-2) unstable; urgency=medium
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
libseccomp (2.4.2-2) unstable; urgency=medium

  [ Christian Ehrhardt ]
  * d/rules: fix potential FTFBS after full python3 switch
  * d/t/control: drop python2 test following the removal of the package

  [ Felix Geyer ]
  * Remove build-dependency on valgrind for mips64el as it's broken there.
  * Backport patch to define __SNR_ppoll again.
    - Add api_define__SNR_ppoll_again.patch
  * Replace custom patch for cython3 with the upstream fix.

[dgit import unpatched libseccomp 2.4.2-2]

6 years agoImport libseccomp_2.4.2-2.debian.tar.xz
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Import libseccomp_2.4.2-2.debian.tar.xz

[dgit import tarball libseccomp 2.4.2-2 libseccomp_2.4.2-2.debian.tar.xz]

6 years agoImport libseccomp_2.4.2.orig.tar.gz
Felix Geyer [Tue, 12 Nov 2019 23:00:49 +0000 (23:00 +0000)]
Import libseccomp_2.4.2.orig.tar.gz

[dgit import orig libseccomp_2.4.2.orig.tar.gz]

6 years agoMerge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
Merge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch

6 years agopython_install_dir
Kees Cook [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
python_install_dir

From 830929096665eab2b910d676ccab1df90908cb02 Mon Sep 17 00:00:00 2001
From: Felix Geyer <debfx@fobos.de>
Date: Mon, 15 Jul 2019 21:12:05 +0200
Subject: [PATCH] Install the python extension to the root package dir

Commit 8ad3638ea9023c3948976dfadebd1554380a31c9 effectively added libseccomp/
to the install path of the python extension.
This changed the import module name from "seccomp" to "libseccomp.seccomp",
breaking existing users.

Revert the install path like it was before 2.4.0

Signed-off-by: Felix Geyer <debfx@fobos.de>
Gbp-Pq: Name python_install_dir.patch

6 years agolibseccomp (2.4.1-2+rpi1) bullseye-staging; urgency=medium
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
libseccomp (2.4.1-2+rpi1) bullseye-staging; urgency=medium

  * Move valigrind from build-depends to build-conflicts, raspbians valgrind
    is somewhat broken and causes testsuite failures.

[dgit import unpatched libseccomp 2.4.1-2+rpi1]

6 years agoImport libseccomp_2.4.1-2+rpi1.debian.tar.xz
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
Import libseccomp_2.4.1-2+rpi1.debian.tar.xz

[dgit import tarball libseccomp 2.4.1-2+rpi1 libseccomp_2.4.1-2+rpi1.debian.tar.xz]

6 years agoMerge libseccomp (2.4.1-2) import into refs/heads/workingbranch
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
Merge libseccomp (2.4.1-2) import into refs/heads/workingbranch

6 years agopython_install_dir
Kees Cook [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
python_install_dir

From 830929096665eab2b910d676ccab1df90908cb02 Mon Sep 17 00:00:00 2001
From: Felix Geyer <debfx@fobos.de>
Date: Mon, 15 Jul 2019 21:12:05 +0200
Subject: [PATCH] Install the python extension to the root package dir

Commit 8ad3638ea9023c3948976dfadebd1554380a31c9 effectively added libseccomp/
to the install path of the python extension.
This changed the import module name from "seccomp" to "libseccomp.seccomp",
breaking existing users.

Revert the install path like it was before 2.4.0

Signed-off-by: Felix Geyer <debfx@fobos.de>
Gbp-Pq: Name python_install_dir.patch

6 years agolibseccomp (2.4.1-2) unstable; urgency=medium
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
libseccomp (2.4.1-2) unstable; urgency=medium

  * Remove build-dependency on valgrind for mipsel and x32 as it's broken
    on those archs.
  * Set Rules-Requires-Root: no.

[dgit import unpatched libseccomp 2.4.1-2]

6 years agoImport libseccomp_2.4.1-2.debian.tar.xz
Felix Geyer [Thu, 18 Jul 2019 22:03:34 +0000 (23:03 +0100)]
Import libseccomp_2.4.1-2.debian.tar.xz

[dgit import tarball libseccomp 2.4.1-2 libseccomp_2.4.1-2.debian.tar.xz]

6 years agoImport libseccomp_2.4.1.orig.tar.gz
Felix Geyer [Wed, 17 Jul 2019 21:23:28 +0000 (22:23 +0100)]
Import libseccomp_2.4.1.orig.tar.gz

[dgit import orig libseccomp_2.4.1.orig.tar.gz]

6 years agoMerge libseccomp (2.3.3-4) import into refs/heads/workingbranch
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
Merge libseccomp (2.3.3-4) import into refs/heads/workingbranch

6 years agoparisc_syscalls_linux415
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux415

Gbp-Pq: Name 31-parisc_syscalls_linux415.patch

6 years agoparisc_syscalls_linux414
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux414

Gbp-Pq: Name 30-parisc_syscalls_linux414.patch

6 years agoparisc_syscalls_linux49
Kees Cook [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
parisc_syscalls_linux49

Gbp-Pq: Name 29-parisc_syscalls_linux49.patch

6 years agoarch: Add parisc architecture support
Helge Deller [Wed, 25 May 2016 14:53:39 +0000 (16:53 +0200)]
arch: Add parisc architecture support

This patch (v4) adds support for the parisc and parisc64 architectures
to libseccomp.

I didn't split up the patch, because it's pretty trivial.
Those parisc-specific files gets added:
 src/arch-parisc-syscalls.c
 src/arch-parisc.c
 src/arch-parisc.h
 src/arch-parisc64.c

All other changes are trivial because they simply add parisc-specific
case statements in variouse switch statements.

I did ran a "make check" on x86-64 and parisc and all testcases succeeded.
All live testcases succeed as well when running "./regression -T live".

The patch applies cleanly to current libseccomp git head.

Changes between v4 and v3 of this patch:
- Added parisc arch to arch-syscall-check.c and fixup syscall table as
  needed
- Fixed copyright notices in parisc files as suggested by Mike Frysinger

Changes between v3 and v2 of this patch:
- Stripped out patch which reports if a check was skipped because
  valgrind isn't installed.
- Added tuxcall pseudo syscall for 19-sim-missing_syscalls testcase
- Added sysmips pseudo syscall for 29-sim-pseudo_syscall testcase

Changes between v2 and v1 of this patch:
- Enabled seccomp mode 2 regression tests on parisc. Kernel support for
  hppa was added in kernel 4.6-rc1 and backported into the kernel v4.5.2
  stable series.

Signed-off-by: Helge Deller <deller@gmx.de>
[PM: corrected a number or errors from 'make check-syntax']
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name 28-parisc_support.patch

6 years agolibseccomp (2.3.3-4) unstable; urgency=medium
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
libseccomp (2.3.3-4) unstable; urgency=medium

  [ Ondřej Nový ]
  * d/copyright: Change Format URL to correct one

  [ Helmut Grohne ]
  * Fix FTCBFS: (Closes: #903556)
    + Multiarchify python Build-Depends.
    + Annotate cython dependencies with :native for now.
    + Drop noop dh_auto_build invocations.
    + Pass a suitable PYTHONPATH for python2.
    + Pass _PYTHON_SYSCONFIGDATA_NAME for python3.

[dgit import unpatched libseccomp 2.3.3-4]

6 years agoImport libseccomp_2.3.3-4.debian.tar.xz
Felix Geyer [Sun, 10 Feb 2019 11:25:44 +0000 (11:25 +0000)]
Import libseccomp_2.3.3-4.debian.tar.xz

[dgit import tarball libseccomp 2.3.3-4 libseccomp_2.3.3-4.debian.tar.xz]

7 years agoImport libseccomp_2.3.3.orig.tar.gz
Felix Geyer [Sun, 22 Apr 2018 21:55:03 +0000 (22:55 +0100)]
Import libseccomp_2.3.3.orig.tar.gz

[dgit import orig libseccomp_2.3.3.orig.tar.gz]

11 years agobuild-ldflags
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
build-ldflags

Gbp-Pq: Name build-ldflags.patch

11 years agomanpage-typo
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
manpage-typo

Gbp-Pq: Name manpage-typo.patch

11 years agopkgconfig-macro
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
pkgconfig-macro

Gbp-Pq: Name pkgconfig-macro.patch

11 years agolibseccomp (2.1.1-1) unstable; urgency=low
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
libseccomp (2.1.1-1) unstable; urgency=low

  * New upstream release (Closes: 733293).
  * copyright: add a few missed people.
  * rules: adjusted for new test target.
  * libseccomp2.symbols: drop accidentally exported functions.
  * control:
    - bump standards, no changes needed.
    - add armel target

[dgit import unpatched libseccomp 2.1.1-1]

11 years agoImport libseccomp_2.1.1.orig.tar.gz
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
Import libseccomp_2.1.1.orig.tar.gz

[dgit import orig libseccomp_2.1.1.orig.tar.gz]

11 years agoImport libseccomp_2.1.1-1.debian.tar.xz
Kees Cook [Sat, 12 Apr 2014 17:44:22 +0000 (18:44 +0100)]
Import libseccomp_2.1.1-1.debian.tar.xz

[dgit import tarball libseccomp 2.1.1-1 libseccomp_2.1.1-1.debian.tar.xz]