libseccomp.git
8 months agoMerge version 2.5.5-2+rpi1 and 2.6.0-2 to produce 2.6.0-2+rpi1 trixie-staging archive/raspbian/2.6.0-2+rpi1 raspbian/2.6.0-2+rpi1
Raspbian automatic forward porter [Fri, 28 Mar 2025 11:26:03 +0000 (11:26 +0000)]
Merge version 2.5.5-2+rpi1 and 2.6.0-2 to produce 2.6.0-2+rpi1

8 months agoMerge libseccomp (2.6.0-2) import into refs/heads/workingbranch
Felix Geyer [Thu, 20 Mar 2025 21:12:14 +0000 (22:12 +0100)]
Merge libseccomp (2.6.0-2) import into refs/heads/workingbranch

8 months ago[PATCH] hash: fix strict aliasing UB in MurMur hash implementation
Romain Geissler [Tue, 18 Feb 2025 22:29:05 +0000 (22:29 +0000)]
[PATCH] hash: fix strict aliasing UB in MurMur hash implementation

This was spotted when trying to upgrade the libseccomp fedora package to
version 2.6.0 in fedora rawhide. It comes with gcc 15 and LTO enabled by
default. When running the test 61-sim-transactions we get plenty of such
errors in valgrind:

==265507== Use of uninitialised value of size 8
==265507==    at 0x4096AD: _hsh_add (gen_bpf.c:599)
==265507==    by 0x40A557: UnknownInlinedFun (gen_bpf.c:2016)
==265507==    by 0x40A557: gen_bpf_generate (gen_bpf.c:2341)
==265507==    by 0x400CDE: UnknownInlinedFun (db.c:2685)
==265507==    by 0x400CDE: UnknownInlinedFun (db.c:2682)
==265507==    by 0x400CDE: UnknownInlinedFun (api.c:756)
==265507==    by 0x400CDE: UnknownInlinedFun (util.c:162)
==265507==    by 0x400CDE: UnknownInlinedFun (util.c:153)
==265507==    by 0x400CDE: main (61-sim-transactions.c:128)
==265507==  Uninitialised value was created by a stack allocation
==265507==    at 0x409590: _hsh_add (gen_bpf.c:573)

Investigating this a bit, it seems that because of LTO the MurMur hash
implementation is being inlined in _hsh_add. The two buffers data and
blocks to point at the same underlying data, but via incompatible type,
which is a strict aliasing violation. Instead, remove the getblock32
function and inline the copy with memcpy.

This is reproducible on a "fedora:rawhide" container (gcc 15) and using:
export CFLAGS='-O2 -flto=auto -ffat-lto-objects -g'

Signed-off-by: Romain Geissler <romain.geissler@amadeus.com>
Reviewed-by: Sam James <sam@gentoo.org>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name hash_fix_strict_aliasing_UB_in_MurMur_hash_implementation.patch

8 months ago[PATCH] api: fix seccomp_export_bpf_mem out-of-bounds read
Alyssa Ross [Thu, 13 Feb 2025 11:05:17 +0000 (12:05 +0100)]
[PATCH] api: fix seccomp_export_bpf_mem out-of-bounds read

*len is the length of the destination buffer, but program->blks is
probably not anywhere near that long.  It's already been checked above
that BPF_PGM_SIZE(program) is less than or equal to *len, so that's
the correct value to use here to avoid either reading or writing too
much.

I noticed this because tests/11-basic-basic_errors started failing on
musl after e797591 ("all: add seccomp_precompute() functionality").

Signed-off-by: Alyssa Ross <hi@alyssa.is>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name api_fix_seccomp_export_bpf_mem_out-of-bounds_read.patch

8 months ago[PATCH] tests: remove the fuzzer from test 62-sim-arch_transactions
Paul Moore [Sat, 25 Jan 2025 16:12:55 +0000 (11:12 -0500)]
[PATCH] tests: remove the fuzzer from test 62-sim-arch_transactions

We can't reliably run the bpf-sim-fuzz tests on tests which manipulate
the filters arch/ABIs unless the filter is safe to run on all arch/ABIs,
which is more or less impossible.  Remove the bpf-sim-fuzz test section
in test #62 to work around this, just as we do with the other similar
tests.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
(cherry picked from commit 7db46d72f13c172b290818f624c2966bd0db5677)

Gbp-Pq: Name tests_remove_the_fuzzer_from_test_62-sim-arch_transactions.patch

8 months agopython_single_version_externally_managed
Kees Cook [Thu, 20 Mar 2025 21:12:14 +0000 (22:12 +0100)]
python_single_version_externally_managed

Fix building with setuptools instead of distutils.

Gbp-Pq: Name python_single_version_externally_managed.patch

8 months agolibseccomp (2.6.0-2) unstable; urgency=medium
Felix Geyer [Thu, 20 Mar 2025 21:12:14 +0000 (22:12 +0100)]
libseccomp (2.6.0-2) unstable; urgency=medium

  * Upload to unstable.
  * Disable valgrind unit tests, it's not stable enough.
  * Cherry-pick upstream fixes:
    - tests_remove_the_fuzzer_from_test_62-sim-arch_transactions.patch
    - hash_fix_strict_aliasing_UB_in_MurMur_hash_implementation.patch
    - api_fix_seccomp_export_bpf_mem_out-of-bounds_read.patch

[dgit import unpatched libseccomp 2.6.0-2]

8 months agoImport libseccomp_2.6.0-2.debian.tar.xz
Felix Geyer [Thu, 20 Mar 2025 21:12:14 +0000 (22:12 +0100)]
Import libseccomp_2.6.0-2.debian.tar.xz

[dgit import tarball libseccomp 2.6.0-2 libseccomp_2.6.0-2.debian.tar.xz]

10 months agoImport libseccomp_2.6.0.orig.tar.gz
Felix Geyer [Fri, 24 Jan 2025 21:10:51 +0000 (22:10 +0100)]
Import libseccomp_2.6.0.orig.tar.gz

[dgit import orig libseccomp_2.6.0.orig.tar.gz]

12 months agoMerge version 2.5.5-1+rpi1 and 2.5.5-2 to produce 2.5.5-2+rpi1 archive/raspbian/2.5.5-2+rpi1 raspbian/2.5.5-2+rpi1
Raspbian automatic forward porter [Wed, 11 Dec 2024 14:41:02 +0000 (14:41 +0000)]
Merge version 2.5.5-1+rpi1 and 2.5.5-2 to produce 2.5.5-2+rpi1

12 months agoMerge libseccomp (2.5.5-2) import into refs/heads/workingbranch
Felix Geyer [Sun, 24 Nov 2024 20:54:16 +0000 (21:54 +0100)]
Merge libseccomp (2.5.5-2) import into refs/heads/workingbranch

12 months ago[PATCH] syscalls: Update the syscall table for Linux v6.12-rc5
WANG Xuerui [Tue, 20 Aug 2024 04:21:21 +0000 (12:21 +0800)]
[PATCH] syscalls: Update the syscall table for Linux v6.12-rc5

Due to the addition of fstat & newfstatat to the LoongArch syscall ABI,
tests 38 and 55 have to be updated for the changed syscall numbers.

As for the PNR additions, normally they are allocated alphabetically for
the syscalls introduced between updates of the table, but in the v2.5
release branch -10245 is already assigned to map_shadow_stack in
commit 53267af3fb5 ("all: update the syscall table for Linux v6.7-rc3").
While the map_shadow_stack syscall is in fact available across all
architectures, for consistency with v2.5.5 and later it is kept in the
same position in this update.

Signed-off-by: WANG Xuerui <git@xen0n.name>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name syscalls_Update_the_syscall_table_for_Linux_v6.12-rc5.patch

12 months ago[PATCH] arch: adapt arch-syscall-validate to Linux 6.11
WANG Xuerui [Tue, 20 Aug 2024 04:16:55 +0000 (12:16 +0800)]
[PATCH] arch: adapt arch-syscall-validate to Linux 6.11

The aarch64, loongarch64 and riscv64 architectures have their syscall
table sources changed to scripts/syscall.tbl, from the original
inclusion of asm-generic/unistd.h. Make the script recognize the new
format for these architectures.

Signed-off-by: WANG Xuerui <git@xen0n.name>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name arch_adapt_arch-syscall-validate_to_Linux_6.11.patch

12 months ago[PATCH] arch: unify handling of syscall.tbl in arch-syscall-validate
WANG Xuerui [Tue, 20 Aug 2024 04:05:46 +0000 (12:05 +0800)]
[PATCH] arch: unify handling of syscall.tbl in arch-syscall-validate

Apart from de-duplication of logic, this refactor is also going to help
syncing to the Linux 6.11+ definitions, where all architectures are
converted to source their syscall definitions from syscall.tbl files.

The change is tested on Linux 6.2 sources to not affect the generated
syscalls.csv apart from timestamp changes.

Signed-off-by: WANG Xuerui <git@xen0n.name>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name arch_unify_handling_of_syscall.tbl_in_arch-syscall-validate.patch

12 months ago[PATCH] tests: only use bogus syscall numbers in test 29
Paul Moore [Thu, 5 Sep 2024 21:29:13 +0000 (17:29 -0400)]
[PATCH] tests: only use bogus syscall numbers in test 29

The goal of test 29 is to test bogus negative syscall numbers,
unfortunately it appears our choice of syscalls was not bogus on all
the architectures we support.  This commit fixes that by picking a
syscall number well outside the pseudo-syscall/PNR range and removing
the sysmips(2) syscall from the test so as to not cause problems
at a later date.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name tests_only_use_bogus_syscall_numbers_in_test_29.patch

12 months ago[PATCH] tests: Fix wrong syscall-error in test 29
Mayank Mrinal [Thu, 1 Jun 2023 09:23:44 +0000 (14:53 +0530)]
[PATCH] tests: Fix wrong syscall-error in test 29

29-sim-pseudo_syscall.c was using `-11001` syscall.
Corrected it to `-10001`.

Signed-off-by: Mayank Mrinal <mayank.mrinal@sony.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name tests_Fix_wrong_syscall-error_in_test_29.patch

12 months ago[PATCH] doc: update README and manpage for 64-bit LoongArch
Xiaotian Wu [Tue, 9 Feb 2021 07:52:55 +0000 (15:52 +0800)]
[PATCH] doc: update README and manpage for 64-bit LoongArch

Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name doc_update_README_and_manpage_for_64-bit_LoongArch.patch

12 months ago[PATCH] tests: Add 64-bit LoongArch support
Xiaotian Wu [Tue, 9 Feb 2021 07:52:18 +0000 (15:52 +0800)]
[PATCH] tests: Add 64-bit LoongArch support

[xen0n: LoongArch (and a few upcoming architectures / ABIs) does not
have fstat, so the fstat in 06-sim-actions is also being changed to
fstatfs for uniformity across the board.]

Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn>
Signed-off-by: WANG Xuerui <git@xen0n.name>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name tests_Add_64-bit_LoongArch_support.patch

12 months ago[PATCH] arch: Add 64-bit LoongArch support
Xiaotian Wu [Tue, 9 Feb 2021 07:39:13 +0000 (15:39 +0800)]
[PATCH] arch: Add 64-bit LoongArch support

Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn>
Signed-off-by: WANG Xuerui <git@xen0n.name>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name arch_Add_64-bit_LoongArch_support.patch

12 months ago[PATCH] tests: add fstatfs() syscall in the 06-sim-actions
Xiaotian Wu [Sun, 23 Oct 2022 06:36:42 +0000 (14:36 +0800)]
[PATCH] tests: add fstatfs() syscall in the 06-sim-actions

Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name tests_add_fstatfs_syscall_in_the_06-sim-actions.patch

12 months ago[PATCH] syscalls: update to Linux v6.0
Xiaotian Wu [Sat, 6 Nov 2021 06:13:49 +0000 (14:13 +0800)]
[PATCH] syscalls: update to Linux v6.0

Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn>
Signed-off-by: WANG Xuerui <git@xen0n.name>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name syscalls_update_to_Linux_v6.0.patch

12 months agopython_single_version_externally_managed
Kees Cook [Sun, 24 Nov 2024 20:54:16 +0000 (21:54 +0100)]
python_single_version_externally_managed

Fix building with setuptools instead of distutils.

Gbp-Pq: Name python_single_version_externally_managed.patch

12 months ago[PATCH] python: Fix distutils DeprecationWarning
Tom Hromatka [Mon, 21 Mar 2022 17:24:25 +0000 (11:24 -0600)]
[PATCH] python: Fix distutils DeprecationWarning

The python distutils package is deprecated.  Utilize
setuptools and cythonize instead.

./setup.py:26: DeprecationWarning: The distutils
package is deprecated and slated for removal in
Python 3.12. Use setuptools or check PEP 632 [1] for
potential alternatives

[1] https://peps.python.org/pep-0632/

Fixes: https://github.com/seccomp/libseccomp/issues/372
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name python_Fix_distutils_DeprecationWarning.patch

12 months agolibseccomp (2.5.5-2) unstable; urgency=medium
Felix Geyer [Sun, 24 Nov 2024 20:54:16 +0000 (21:54 +0100)]
libseccomp (2.5.5-2) unstable; urgency=medium

  * Revert: Dynamically skip autopkgtests when the test runner already applies
    seccomp restrictions.
    - Container based backends usually apply a seccomp filter so it's better
      to declare the isolation-machine restriction.
  * Backport support for syscalls up to kernel v6.12-rc5 and loongarch64.
    (Closes: #1051323)
    - syscalls_update_to_Linux_v6.0.patch
    - tests_add_fstatfs_syscall_in_the_06-sim-actions.patch
    - arch_Add_64-bit_LoongArch_support.patch
    - tests_Add_64-bit_LoongArch_support.patch
    - doc_update_README_and_manpage_for_64-bit_LoongArch.patch
    - tests_Fix_wrong_syscall-error_in_test_29.patch
    - tests_only_use_bogus_syscall_numbers_in_test_29.patch
    - arch_unify_handling_of_syscall.tbl_in_arch-syscall-validate.patch
    - arch_adapt_arch-syscall-validate_to_Linux_6.11.patch
    - syscalls_Update_the_syscall_table_for_Linux_v6.12-rc5.patch

[dgit import unpatched libseccomp 2.5.5-2]

12 months agoImport libseccomp_2.5.5-2.debian.tar.xz
Felix Geyer [Sun, 24 Nov 2024 20:54:16 +0000 (21:54 +0100)]
Import libseccomp_2.5.5-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.5-2 libseccomp_2.5.5-2.debian.tar.xz]

22 months agoMerge version 2.5.4-2+rpi1 and 2.5.5-1 to produce 2.5.5-1+rpi1 archive/raspbian/2.5.5-1+rpi1 raspbian/2.5.5-1+rpi1
Raspbian automatic forward porter [Thu, 18 Jan 2024 23:38:25 +0000 (23:38 +0000)]
Merge version 2.5.4-2+rpi1 and 2.5.5-1 to produce 2.5.5-1+rpi1

23 months agoMerge libseccomp (2.5.5-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 4 Jan 2024 17:29:54 +0000 (18:29 +0100)]
Merge libseccomp (2.5.5-1) import into refs/heads/workingbranch

23 months agoImport libseccomp_2.5.5.orig.tar.gz
Felix Geyer [Thu, 4 Jan 2024 17:29:54 +0000 (18:29 +0100)]
Import libseccomp_2.5.5.orig.tar.gz

[dgit import orig libseccomp_2.5.5.orig.tar.gz]

23 months agopython_single_version_externally_managed
Kees Cook [Thu, 4 Jan 2024 17:29:54 +0000 (18:29 +0100)]
python_single_version_externally_managed

Fix building with setuptools instead of distutils.

Gbp-Pq: Name python_single_version_externally_managed.patch

23 months ago[PATCH] python: Fix distutils DeprecationWarning
Tom Hromatka [Mon, 21 Mar 2022 17:24:25 +0000 (11:24 -0600)]
[PATCH] python: Fix distutils DeprecationWarning

The python distutils package is deprecated.  Utilize
setuptools and cythonize instead.

./setup.py:26: DeprecationWarning: The distutils
package is deprecated and slated for removal in
Python 3.12. Use setuptools or check PEP 632 [1] for
potential alternatives

[1] https://peps.python.org/pep-0632/

Fixes: https://github.com/seccomp/libseccomp/issues/372
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name python_Fix_distutils_DeprecationWarning.patch

23 months agolibseccomp (2.5.5-1) unstable; urgency=medium
Felix Geyer [Thu, 4 Jan 2024 17:29:54 +0000 (18:29 +0100)]
libseccomp (2.5.5-1) unstable; urgency=medium

  * New upstream release.

[dgit import unpatched libseccomp 2.5.5-1]

23 months agoImport libseccomp_2.5.5-1.debian.tar.xz
Felix Geyer [Thu, 4 Jan 2024 17:29:54 +0000 (18:29 +0100)]
Import libseccomp_2.5.5-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.5-1 libseccomp_2.5.5-1.debian.tar.xz]

2 years agoMerge version 2.5.4-1+rpi1 and 2.5.4-2 to produce 2.5.4-2+rpi1 archive/raspbian/2.5.4-2+rpi1 raspbian/2.5.4-2+rpi1
Raspbian automatic forward porter [Sat, 11 Nov 2023 02:19:23 +0000 (02:19 +0000)]
Merge version 2.5.4-1+rpi1 and 2.5.4-2 to produce 2.5.4-2+rpi1

2 years agoMerge libseccomp (2.5.4-2) import into refs/heads/workingbranch
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
Merge libseccomp (2.5.4-2) import into refs/heads/workingbranch

2 years agopython_single_version_externally_managed
Kees Cook [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
python_single_version_externally_managed

Fix building with setuptools instead of distutils.

Gbp-Pq: Name python_single_version_externally_managed.patch

2 years ago[PATCH] python: Fix distutils DeprecationWarning
Tom Hromatka [Mon, 21 Mar 2022 17:24:25 +0000 (11:24 -0600)]
[PATCH] python: Fix distutils DeprecationWarning

The python distutils package is deprecated.  Utilize
setuptools and cythonize instead.

./setup.py:26: DeprecationWarning: The distutils
package is deprecated and slated for removal in
Python 3.12. Use setuptools or check PEP 632 [1] for
potential alternatives

[1] https://peps.python.org/pep-0632/

Fixes: https://github.com/seccomp/libseccomp/issues/372
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Tom Hromatka <tom.hromatka@oracle.com>
Gbp-Pq: Name python_Fix_distutils_DeprecationWarning.patch

2 years agolibseccomp (2.5.4-2) unstable; urgency=medium
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
libseccomp (2.5.4-2) unstable; urgency=medium

  * Fix watch file. (Closes: #1050659)
  * Dynamically skip autopkgtests when the test runner already applies seccomp
    restrictions.
    - Drop isolation-machine restriction.
  * Fix FTBFS with setuptools. (Closes: #1054788, #1033641)
    - Add python_Fix_distutils_DeprecationWarning.patch
    - Add python_single_version_externally_managed.patch
    - Explicitly build-depend on python3-setuptools

[dgit import unpatched libseccomp 2.5.4-2]

2 years agoImport libseccomp_2.5.4-2.debian.tar.xz
Felix Geyer [Sun, 29 Oct 2023 14:13:08 +0000 (15:13 +0100)]
Import libseccomp_2.5.4-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.4-2 libseccomp_2.5.4-2.debian.tar.xz]

3 years agoMerge version 2.5.3-2+rpi1 and 2.5.4-1 to produce 2.5.4-1+rpi1 archive/raspbian/2.5.4-1+rpi1 raspbian/2.5.4-1+rpi1
Raspbian automatic forward porter [Wed, 27 Apr 2022 08:18:08 +0000 (09:18 +0100)]
Merge version 2.5.3-2+rpi1 and 2.5.4-1 to produce 2.5.4-1+rpi1

3 years agoMerge libseccomp (2.5.4-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Merge libseccomp (2.5.4-1) import into refs/heads/workingbranch

3 years agoImport libseccomp_2.5.4.orig.tar.gz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (22:23 +0200)]
Import libseccomp_2.5.4.orig.tar.gz

[dgit import orig libseccomp_2.5.4.orig.tar.gz]

3 years agolibseccomp (2.5.4-1) unstable; urgency=medium
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
libseccomp (2.5.4-1) unstable; urgency=medium

  * New upstream release.

[dgit import unpatched libseccomp 2.5.4-1]

3 years agoImport libseccomp_2.5.4.orig.tar.gz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Import libseccomp_2.5.4.orig.tar.gz

[dgit import orig libseccomp_2.5.4.orig.tar.gz]

3 years agoImport libseccomp_2.5.4-1.debian.tar.xz
Felix Geyer [Thu, 21 Apr 2022 20:23:12 +0000 (21:23 +0100)]
Import libseccomp_2.5.4-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.4-1 libseccomp_2.5.4-1.debian.tar.xz]

4 years agoMerge version 2.5.2-2+rpi1 and 2.5.3-2 to produce 2.5.3-2+rpi1 archive/raspbian/2.5.3-2+rpi1 raspbian/2.5.3-2+rpi1
Raspbian automatic forward porter [Thu, 25 Nov 2021 00:05:20 +0000 (00:05 +0000)]
Merge version 2.5.2-2+rpi1 and 2.5.3-2 to produce 2.5.3-2+rpi1

4 years agoMerge libseccomp (2.5.3-2) import into refs/heads/workingbranch
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
Merge libseccomp (2.5.3-2) import into refs/heads/workingbranch

4 years agolibseccomp (2.5.3-2) unstable; urgency=medium
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
libseccomp (2.5.3-2) unstable; urgency=medium

  [ Alex Murray ]
  * Fix python version check in debian/rules to properly handle python3.10
    to resolve FTBFS (Closes: #999364)

[dgit import unpatched libseccomp 2.5.3-2]

4 years agoImport libseccomp_2.5.3-2.debian.tar.xz
Felix Geyer [Thu, 18 Nov 2021 16:52:23 +0000 (16:52 +0000)]
Import libseccomp_2.5.3-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.3-2 libseccomp_2.5.3-2.debian.tar.xz]

4 years agoImport libseccomp_2.5.3.orig.tar.gz
Felix Geyer [Sat, 6 Nov 2021 15:46:51 +0000 (15:46 +0000)]
Import libseccomp_2.5.3.orig.tar.gz

[dgit import orig libseccomp_2.5.3.orig.tar.gz]

4 years agoMerge version 2.5.1-1+rpi1 and 2.5.2-2 to produce 2.5.2-2+rpi1 archive/raspbian/2.5.2-2+rpi1 raspbian/2.5.2-2+rpi1
Raspbian automatic forward porter [Tue, 12 Oct 2021 07:55:59 +0000 (08:55 +0100)]
Merge version 2.5.1-1+rpi1 and 2.5.2-2 to produce 2.5.2-2+rpi1

4 years agoMerge libseccomp (2.5.2-2) import into refs/heads/workingbranch
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
Merge libseccomp (2.5.2-2) import into refs/heads/workingbranch

4 years agorevert_mips_add_multiplexed_syscall_support_to_MIPS
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_mips_add_multiplexed_syscall_support_to_MIPS

REVERTS

From e976080ac5547a46f4654abc710e89bed992bb63 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 23:09:04 -0400
Subject: [PATCH] mips: add multiplexed syscall support to MIPS

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 8e2d449b012647d5f6d6ac86860689ce40e504ae)

Gbp-Pq: Name revert_mips_add_multiplexed_syscall_support_to_MIPS.patch

4 years agorevert_ppc_add_multiplexed_syscall_support_to_PPC
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_ppc_add_multiplexed_syscall_support_to_PPC

REVERTS

From f93a872fbc404df3dd3739dd399ad67f139fb1fa Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 23:21:55 -0400
Subject: [PATCH] ppc: add multiplexed syscall support to PPC

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 255801bccf89343c684b2b94e85d9e0df484c133)

Gbp-Pq: Name revert_ppc_add_multiplexed_syscall_support_to_PPC.patch

4 years agorevert_arch_consolidate_all_of_the_multiplexed_syscall_handling
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_arch_consolidate_all_of_the_multiplexed_syscall_handling

REVERTS

From f454456e261930d94b3a1a444b6bac75c11c3cb0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 4 Aug 2021 11:51:12 -0400
Subject: [PATCH] arch: consolidate all of the multiplexed syscall handling

Not only does this reduce the amount of duplicated code
significantly, it removes a lot of the "magic" numbers in the
code, and it happened to catch some bugs too.

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 17cbd2c253ce63e5e9e3cec867ff58efbe8b5fdc)

Gbp-Pq: Name revert_arch_consolidate_all_of_the_multiplexed_syscall_handling.patch

4 years agorevert_various_additions_to_improve_code_coverage
Kees Cook [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
revert_various_additions_to_improve_code_coverage

REVERTS

From aa0f858aa58d51c93a176c60a4c83a4a303bcffd Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Tue, 3 Aug 2021 14:12:50 -0400
Subject: [PATCH] tests: various additions to improve code coverage

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit fcc601279004a7f4c2f6ebf766acb4556b0f5e65)

Gbp-Pq: Name revert_various_additions_to_improve_code_coverage.patch

4 years agolibseccomp (2.5.2-2) unstable; urgency=medium
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
libseccomp (2.5.2-2) unstable; urgency=medium

  * Revert mips and powerpc multiplexed syscall handling.
    - Fixes test suite failures. (Closes: #994285)

[dgit import unpatched libseccomp 2.5.2-2]

4 years agoImport libseccomp_2.5.2-2.debian.tar.xz
Felix Geyer [Sun, 3 Oct 2021 21:26:59 +0000 (22:26 +0100)]
Import libseccomp_2.5.2-2.debian.tar.xz

[dgit import tarball libseccomp 2.5.2-2 libseccomp_2.5.2-2.debian.tar.xz]

4 years agoMerge libseccomp (2.5.2-1) import into refs/heads/workingbranch
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Merge libseccomp (2.5.2-1) import into refs/heads/workingbranch

4 years agoImport libseccomp_2.5.2.orig.tar.gz
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Import libseccomp_2.5.2.orig.tar.gz

[dgit import orig libseccomp_2.5.2.orig.tar.gz]

4 years agolibseccomp (2.5.2-1) unstable; urgency=medium
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
libseccomp (2.5.2-1) unstable; urgency=medium

  * New upstream release.
  * Update watch file.

[dgit import unpatched libseccomp 2.5.2-1]

4 years agoImport libseccomp_2.5.2-1.debian.tar.xz
Felix Geyer [Tue, 7 Sep 2021 09:14:34 +0000 (10:14 +0100)]
Import libseccomp_2.5.2-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.2-1 libseccomp_2.5.2-1.debian.tar.xz]

4 years agoMerge version 2.5.0-3+rpi1 and 2.5.1-1 to produce 2.5.1-1+rpi1 archive/raspbian/2.5.1-1+rpi1 raspbian/2.5.1-1+rpi1
Raspbian automatic forward porter [Tue, 29 Dec 2020 13:41:54 +0000 (13:41 +0000)]
Merge version 2.5.0-3+rpi1 and 2.5.1-1 to produce 2.5.1-1+rpi1

4 years agoMerge libseccomp (2.5.1-1) import into refs/heads/workingbranch
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Merge libseccomp (2.5.1-1) import into refs/heads/workingbranch

4 years agolibseccomp (2.5.1-1) unstable; urgency=medium
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
libseccomp (2.5.1-1) unstable; urgency=medium

  * New upstream release.
  * Drop all patches as they have been applied upstream.

[dgit import unpatched libseccomp 2.5.1-1]

4 years agoImport libseccomp_2.5.1.orig.tar.gz
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Import libseccomp_2.5.1.orig.tar.gz

[dgit import orig libseccomp_2.5.1.orig.tar.gz]

4 years agoImport libseccomp_2.5.1-1.debian.tar.xz
Felix Geyer [Mon, 21 Dec 2020 09:50:30 +0000 (09:50 +0000)]
Import libseccomp_2.5.1-1.debian.tar.xz

[dgit import tarball libseccomp 2.5.1-1 libseccomp_2.5.1-1.debian.tar.xz]

5 years agoMerge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1 archive/raspbian/2.5.0-3+rpi1 raspbian/2.5.0-3+rpi1
Raspbian automatic forward porter [Tue, 17 Nov 2020 18:53:52 +0000 (18:53 +0000)]
Merge version 2.4.4-1+rpi1 and 2.5.0-3 to produce 2.5.0-3+rpi1

5 years agoMerge libseccomp (2.5.0-3) import into refs/heads/workingbranch
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Merge libseccomp (2.5.0-3) import into refs/heads/workingbranch

5 years ago[PATCH] arch: ensure we don't "munge" pseudo syscall numbers
Paul Moore [Sun, 16 Aug 2020 13:56:36 +0000 (09:56 -0400)]
[PATCH] arch: ensure we don't "munge" pseudo syscall numbers

A number of arches/ABIs have either syscall offsets (the MIPS
family) or specific bits (x32) which are applied to their normal
syscall numbers.  We generally handle that via "munging" in
libseccomp, and it works reasonably well.  Unfortunately we were
applying this munging process to the negative pseudo syscall
numbers as well and this was causing problems.

This patch fixes the various offset/bit arches/ABIs by not applying
the munging to the negative pseudo syscall numbers.

This resolves GH issue #284:
* https://github.com/seccomp/libseccomp/issues/284

Reported-by: Harald van Dijk <harald@gigawatt.nl>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 34cde704979defcbddb8eea64295acf0e477c250)

Gbp-Pq: Name arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

5 years ago[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04...
Andreas Schwab [Tue, 18 Aug 2020 13:59:54 +0000 (15:59 +0200)]
[PATCH] tests: use openat and fstat instead of open and stat syscalls in tests 04 and 06

Architectures like aarch64 and riscv64, and all future architectures that
use the generic syscall table, do not support the open and stat syscalls.
Use the openat and fstat syscalls instead.

Signed-off-by: Andreas Schwab <schwab@suse.de>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit a317fabc1fd915f19f7e7326bf7dcb77493f1210)

Gbp-Pq: Name tests_use_openat_and_fstat_instead_of_open_and_stat_syscalls.patch

5 years ago[PATCH] build: undefine "mips" to prevent build problems for MIPS targets
Paul Moore [Sun, 2 Aug 2020 13:57:39 +0000 (09:57 -0400)]
[PATCH] build: undefine "mips" to prevent build problems for MIPS targets

It turns out that the MIPS GCC compiler defines a "mips" cpp macro
which was resulting in build failures on MIPS so we need to
undefine the "mips" macro during build.  As this should be safe
to do in all architectures, just add it to the compiler flags by
default.

This was reported in the following GH issue:
* https://github.com/seccomp/libseccomp/issues/274

Reported-by: Rongwei Zhang <pudh4418@gmail.com>
Suggested-by: Rongwei Zhang <pudh4418@gmail.com>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 5cd9059618a0810ee47c21e6b44c5a876b75e23d)

Gbp-Pq: Name build_undefine_mips_to_prevent_build_problems.patch

5 years ago[PATCH] system: change our notification fd handling
Paul Moore [Tue, 4 Aug 2020 14:52:08 +0000 (10:52 -0400)]
[PATCH] system: change our notification fd handling

This commit changes how we handle the notification fd by only
requesting it via _NEW_LISTENER if the filter has a _NOTIFY action
in it.  We also augment the seccomp_reset(NULL, ...) behavior so
that it closes the notification fd before resetting the global
state; applications that need to keep their notification fd open
across a call to seccomp_reset(NULL, ...) can simply dup() it.
Although one would have to wonder why the application would be
calling seccomp_reset(NULL, ...) in that case.

Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit 02812f99e8d1df2e671dac675b4af663d0266303)

Gbp-Pq: Name system_change_our_notification_fd_handling.patch

5 years ago[PATCH] all: only request the userspace notification fd once
Paul Moore [Sun, 26 Jul 2020 15:01:49 +0000 (11:01 -0400)]
[PATCH] all: only request the userspace notification fd once

It turns out that requesting the seccomp userspace notifcation fd
more than once is a bad thing which causes the kernel to complain
(rightfully so for a variety of reasons).  Unfortunately as we were
always requesting the notification fd whenever possible this results
in problems at filter load time.

Our solution is to move the notification fd out of the filter context
and into the global task context, using a newly created task_state
structure.  This allows us to store, and retrieve the notification
outside the scope of an individual filter context.  It also provides
some implementation improvements by giving us a convenient place to
stash all of the API level related support variables.  We also extend
the seccomp_reset() API call to reset this internal global state when
passed a NULL filter context.

There is one potential case which we don't currently handle well:
threads.  At the moment libseccomp is thread ignorant, and that works
well as the only global state up to this point was the currently
supported API level information which was common to all threads in a
process.  Unfortunately, it appears that the notification fd need not
be common to all threads in a process, yet this patch treats it as if
it is common.  I suspect this is a very unusual use case so I decided
to keep this patch simple and ignore this case, but in the future if
we need to support this properly we should be able to do so without
API changes by keeping an internal list of notification fds indexed
by gettid(2).

This fixes the GitHub issue below:
* https://github.com/seccomp/libseccomp/issues/273

Reported-by: Tobias Stoeckmann <tobias@stoeckmann.org>
Acked-by: Tom Hromatka <tom.hromatka@oracle.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
(imported from commit ce314fe4111887c593e3c6b17c60d93bc6ab66b9)

Gbp-Pq: Name all_only_request_the_userspace_notification_fd_once.patch

5 years agolibseccomp (2.5.0-3) unstable; urgency=medium
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
libseccomp (2.5.0-3) unstable; urgency=medium

  * Cherry-pick patch from the 2.5 branch to fix test error on mips:
    - arch_ensure_we_dont_munge_pseudo_syscall_numbers.patch

[dgit import unpatched libseccomp 2.5.0-3]

5 years agoImport libseccomp_2.5.0-3.debian.tar.xz
Felix Geyer [Sun, 8 Nov 2020 18:59:21 +0000 (18:59 +0000)]
Import libseccomp_2.5.0-3.debian.tar.xz

[dgit import tarball libseccomp 2.5.0-3 libseccomp_2.5.0-3.debian.tar.xz]

5 years agoImport libseccomp_2.5.0.orig.tar.gz
Felix Geyer [Sat, 24 Oct 2020 11:58:28 +0000 (12:58 +0100)]
Import libseccomp_2.5.0.orig.tar.gz

[dgit import orig libseccomp_2.5.0.orig.tar.gz]

5 years agoMerge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1 archive/raspbian/2.4.4-1+rpi1 raspbian/2.4.4-1+rpi1
Raspbian automatic forward porter [Mon, 28 Sep 2020 10:25:35 +0000 (11:25 +0100)]
Merge version 2.4.3-1+rpi1 and 2.4.4-1 to produce 2.4.4-1+rpi1

5 years agoMerge libseccomp (2.4.4-1) import into refs/heads/workingbranch
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Merge libseccomp (2.4.4-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.4-1) unstable; urgency=medium
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
libseccomp (2.4.4-1) unstable; urgency=medium

  * Team upload.

  [ Debian Janitor ]
  * Set upstream metadata fields: Repository, Repository-Browse.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository.

  [ Felix Geyer ]
  * New upstream release.
  * Download and verify orig gpg signature.

[dgit import unpatched libseccomp 2.4.4-1]

5 years agoImport libseccomp_2.4.4.orig.tar.gz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4.orig.tar.gz

[dgit import orig libseccomp_2.4.4.orig.tar.gz]

5 years agoImport libseccomp_2.4.4-1.debian.tar.xz
Felix Geyer [Sun, 20 Sep 2020 17:03:41 +0000 (18:03 +0100)]
Import libseccomp_2.4.4-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.4-1 libseccomp_2.4.4-1.debian.tar.xz]

5 years agoMerge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1 archive/raspbian/2.4.3-1+rpi1 raspbian/2.4.3-1+rpi1
Raspbian automatic forward porter [Wed, 18 Mar 2020 12:08:04 +0000 (12:08 +0000)]
Merge version 2.4.2-2+rpi1 and 2.4.3-1 to produce 2.4.3-1+rpi1

5 years agoMerge libseccomp (2.4.3-1) import into refs/heads/workingbranch
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Merge libseccomp (2.4.3-1) import into refs/heads/workingbranch

5 years ago[PATCH] arch: Add RISC-V 64-bit support
Andreas Schwab [Tue, 7 Jan 2020 13:51:19 +0000 (14:51 +0100)]
[PATCH] arch: Add RISC-V 64-bit support

Signed-off-by: Andreas Schwab <schwab@suse.de>
[PM: minor macro shuffling in seccomp.h.in]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name riscv64_support.patch

5 years agocython3
Kees Cook [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
cython3

https://github.com/seccomp/libseccomp/pull/188

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

5 years agolibseccomp (2.4.3-1) unstable; urgency=medium
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
libseccomp (2.4.3-1) unstable; urgency=medium

  * New upstream release.
  * Drop patches that have been applied upstream:
    - tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch
    - api_define__SNR_ppoll_again.patch
  * Cherry-pick support for the riscv64 architecture. (Closes: #952386)
    - Add riscv64_support.patch

[dgit import unpatched libseccomp 2.4.3-1]

5 years agoImport libseccomp_2.4.3.orig.tar.gz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3.orig.tar.gz

[dgit import orig libseccomp_2.4.3.orig.tar.gz]

5 years agoImport libseccomp_2.4.3-1.debian.tar.xz
Felix Geyer [Thu, 12 Mar 2020 22:35:13 +0000 (22:35 +0000)]
Import libseccomp_2.4.3-1.debian.tar.xz

[dgit import tarball libseccomp 2.4.3-1 libseccomp_2.4.3-1.debian.tar.xz]

6 years agoMerge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1 archive/raspbian/2.4.2-2+rpi1 raspbian/2.4.2-2+rpi1
Raspbian automatic forward porter [Thu, 5 Dec 2019 18:50:36 +0000 (18:50 +0000)]
Merge version 2.4.1-2+rpi1 and 2.4.2-2 to produce 2.4.2-2+rpi1

6 years agoMerge libseccomp (2.4.2-2) import into refs/heads/workingbranch
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Merge libseccomp (2.4.2-2) import into refs/heads/workingbranch

6 years agoapi_define__SNR_ppoll_again
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
api_define__SNR_ppoll_again

From 2e54815cd843687d750cc9822f992389bb7b76cd Mon Sep 17 00:00:00 2001
From: Miroslav Lichvar <mlichvar@redhat.com>
Date: Wed, 13 Nov 2019 13:36:10 +0100
Subject: [PATCH] api: define __SNR_ppoll again

Commit bf747eb21e428c2b3ead6ebcca27951b681963a0 accidentally removed the
__SNR_ppoll definition. Add it back, using a PNR value if disabled in
the kernel headers.

Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com>
Gbp-Pq: Name api_define__SNR_ppoll_again.patch

6 years agocython3
Kees Cook [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
cython3

From 8d09eb9314ad00aa0584345ae66d4419b38da8e0 Mon Sep 17 00:00:00 2001
From: Paul Moore <paul@paul-moore.com>
Date: Wed, 13 Nov 2019 20:54:25 -0500
Subject: [PATCH] build: try to use explicitly marked Python 3.x tools first

Python 2.x is going EOL very soon, so let's require Python 3.x now
and attempt to use the explicitly marked Python 3.x tools first.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Gbp-Pq: Name cython3.patch

6 years agotests: rely on __SNR_xxx instead of __NR_xxx for syscalls
Paul Moore [Tue, 5 Nov 2019 20:11:11 +0000 (15:11 -0500)]
tests: rely on __SNR_xxx instead of __NR_xxx for syscalls

We recently changed how libseccomp handles syscall numbers that are
not defined natively, but we missed test #15.

Signed-off-by: Paul Moore <paul@paul-moore.com>
Note: Tagged for v2.5, but needed to build 2.4.2 with newer kernels on arm
This is part of PR: https://github.com/seccomp/libseccomp/pull/182
Upstream Bug: https://github.com/seccomp/libseccomp/issues/184
Origin: upstream, https://github.com/pcmoore/misc-libseccomp/commit/35803ceb43c453762a3ab5177c5f8d5dbb813478
Bug-Ubuntu: https://bugs.launchpad.net/bugs/1849785
Last-Update: 2019-11-12

Gbp-Pq: Name tests-rely-on-__SNR_xxx-instead-of-__NR_xxx-for-sysc.patch

6 years agolibseccomp (2.4.2-2) unstable; urgency=medium
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
libseccomp (2.4.2-2) unstable; urgency=medium

  [ Christian Ehrhardt ]
  * d/rules: fix potential FTFBS after full python3 switch
  * d/t/control: drop python2 test following the removal of the package

  [ Felix Geyer ]
  * Remove build-dependency on valgrind for mips64el as it's broken there.
  * Backport patch to define __SNR_ppoll again.
    - Add api_define__SNR_ppoll_again.patch
  * Replace custom patch for cython3 with the upstream fix.

[dgit import unpatched libseccomp 2.4.2-2]

6 years agoImport libseccomp_2.4.2-2.debian.tar.xz
Felix Geyer [Fri, 15 Nov 2019 17:12:53 +0000 (17:12 +0000)]
Import libseccomp_2.4.2-2.debian.tar.xz

[dgit import tarball libseccomp 2.4.2-2 libseccomp_2.4.2-2.debian.tar.xz]

6 years agoImport libseccomp_2.4.2.orig.tar.gz
Felix Geyer [Tue, 12 Nov 2019 23:00:49 +0000 (23:00 +0000)]
Import libseccomp_2.4.2.orig.tar.gz

[dgit import orig libseccomp_2.4.2.orig.tar.gz]

6 years agoMerge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
Merge libseccomp (2.4.1-2+rpi1) import into refs/heads/workingbranch

6 years agopython_install_dir
Kees Cook [Wed, 24 Jul 2019 22:12:36 +0000 (23:12 +0100)]
python_install_dir

From 830929096665eab2b910d676ccab1df90908cb02 Mon Sep 17 00:00:00 2001
From: Felix Geyer <debfx@fobos.de>
Date: Mon, 15 Jul 2019 21:12:05 +0200
Subject: [PATCH] Install the python extension to the root package dir

Commit 8ad3638ea9023c3948976dfadebd1554380a31c9 effectively added libseccomp/
to the install path of the python extension.
This changed the import module name from "seccomp" to "libseccomp.seccomp",
breaking existing users.

Revert the install path like it was before 2.4.0

Signed-off-by: Felix Geyer <debfx@fobos.de>
Gbp-Pq: Name python_install_dir.patch