Hello community, here is the log from the commit of package libseccomp for openSUSE:Factory checked in at 2020-06-11 09:59:49 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/libseccomp (Old) and /work/SRC/openSUSE:Factory/.libseccomp.new.3606 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "libseccomp" Thu Jun 11 09:59:49 2020 rev:28 rq:811834 version:2.4.3 Changes: -------- --- /work/SRC/openSUSE:Factory/libseccomp/libseccomp.changes 2020-02-24 15:49:43.599113809 +0100 +++ /work/SRC/openSUSE:Factory/.libseccomp.new.3606/libseccomp.changes 2020-06-11 10:00:01.002255927 +0200 @@ -1,0 +2,13 @@ +Fri Jun 5 13:12:29 UTC 2020 - Jan Engelhardt <[email protected]> + +- Update to release 2.4.3 + * Add list of authorized release signatures to README.md + * Fix multiplexing issue with s390/s390x shm* syscalls + * Remove the static flag from libseccomp tools compilation + * Add define for __SNR_ppoll + * Fix potential memory leak identified by clang in the + scmp_bpf_sim tool +- Drop no-static.diff, libseccomp-fix_aarch64-test.patch, + SNR_ppoll.patch (merged) + +------------------------------------------------------------------- Old: ---- SNR_ppoll.patch libseccomp-2.4.2.tar.gz libseccomp-fix_aarch64-test.patch no-static.diff New: ---- libseccomp-2.4.3.tar.gz libseccomp-2.4.3.tar.gz.asc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ libseccomp.spec ++++++ --- /var/tmp/diff_new_pack.vZ82gd/_old 2020-06-11 10:00:02.446260578 +0200 +++ /var/tmp/diff_new_pack.vZ82gd/_new 2020-06-11 10:00:02.466260642 +0200 @@ -18,20 +18,16 @@ %define lname libseccomp2 Name: libseccomp -Version: 2.4.2 +Version: 2.4.3 Release: 0 Summary: A Seccomp (mode 2) helper library License: LGPL-2.1-only Group: Development/Libraries/C and C++ URL: https://github.com/seccomp/libseccomp Source: https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz -# no fitting key found -#Source2: https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz.asc +Source2: https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz.asc Source3: %name.keyring Source99: baselibs.conf -Patch1: no-static.diff -Patch2: libseccomp-fix_aarch64-test.patch -Patch3: SNR_ppoll.patch BuildRequires: autoconf BuildRequires: automake >= 1.11 BuildRequires: fdupes ++++++ libseccomp-2.4.2.tar.gz -> libseccomp-2.4.3.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/CHANGELOG new/libseccomp-2.4.3/CHANGELOG --- old/libseccomp-2.4.2/CHANGELOG 2019-11-07 15:17:28.195643331 +0100 +++ new/libseccomp-2.4.3/CHANGELOG 2020-03-02 18:28:40.058107971 +0100 @@ -2,6 +2,16 @@ =============================================================================== https://github.com/seccomp/libseccomp +* Version 2.4.3 - March 4, 2020 +- Add list of authorized release signatures to README.md +- Fix multiplexing issue with s390/s390x shm* syscalls +- Remove the static flag from libseccomp tools compilation +- Add define for __SNR_ppoll +- Update our Travis CI configuration to use Ubuntu 18.04 +- Disable live python tests in Travis CI +- Use default python, rather than nightly python, in TravisCI +- Fix potential memory leak identified by clang in the scmp_bpf_sim tool + * Version 2.4.2 - November 7, 2019 - Update the syscall table for Linux v5.4-rc4 - Stop defining __NR_x values for syscalls that don't exist. Libseccomp diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/CREDITS new/libseccomp-2.4.3/CREDITS --- old/libseccomp-2.4.2/CREDITS 2019-11-07 15:17:28.195643331 +0100 +++ new/libseccomp-2.4.3/CREDITS 2020-03-02 18:14:08.813783903 +0100 @@ -7,11 +7,13 @@ Ashley Lai <[email protected]> Bogdan Purcareata <[email protected]> Brian Cain <[email protected]> +Chris Waldon <[email protected]> Colin Walters <[email protected]> Corey Bryant <[email protected]> David Drysdale <[email protected]> Eduardo Otubo <[email protected]> Eric Paris <[email protected]> +Fabrice Fontaine <[email protected]> Felix Abecassis <[email protected]> Felix Geyer <[email protected]> Heiko Carstens <[email protected]> @@ -34,6 +36,7 @@ Michael Forney <[email protected]> Mike Frysinger <[email protected]> Mike Strosaker <[email protected]> +Miroslav Lichvar <[email protected]> Paul Moore <[email protected]> Serge Hallyn <[email protected]> Stéphane Graber <[email protected]> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/README.md new/libseccomp-2.4.3/README.md --- old/libseccomp-2.4.2/README.md 2019-11-07 15:17:18.502652712 +0100 +++ new/libseccomp-2.4.3/README.md 2020-03-02 16:43:34.185033115 +0100 @@ -63,6 +63,24 @@ Those who are interested in contributing to the the project are encouraged to read the CONTRIBUTING in the top level directory. +## Verifying Release Tarballs + +Before use you should verify the downloaded release tarballs and checksums +using the detached signatures supplied as part of the release; the detached +signature files are the "*.asc" files. If you have GnuPG installed you can +verify detached signatures using the following command: + + # gpg --verify file.asc file + +At present, only the following keys are authorized to sign official libseccomp +releases: + + Paul Moore <[email protected]> + 7100 AADF AE6E 6E94 0D2E 0AD6 55E4 5A5A E8CA 7C8A + + Tom Hromatka <[email protected]> + 47A6 8FCE 37C7 D702 4FD6 5E11 356C E62C 2B52 4099 + ## Building and Installing the Library If you are building the libseccomp library from an official release tarball, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/configure new/libseccomp-2.4.3/configure --- old/libseccomp-2.4.2/configure 2019-11-07 16:18:34.850118644 +0100 +++ new/libseccomp-2.4.3/configure 2020-03-02 18:45:52.372769020 +0100 @@ -1,6 +1,6 @@ #! /bin/sh # Guess values for system-dependent variables and create Makefiles. -# Generated by GNU Autoconf 2.69 for libseccomp 2.4.2. +# Generated by GNU Autoconf 2.69 for libseccomp 2.4.3. # # # Copyright (C) 1992-1996, 1998-2012 Free Software Foundation, Inc. @@ -587,8 +587,8 @@ # Identity of this package. PACKAGE_NAME='libseccomp' PACKAGE_TARNAME='libseccomp' -PACKAGE_VERSION='2.4.2' -PACKAGE_STRING='libseccomp 2.4.2' +PACKAGE_VERSION='2.4.3' +PACKAGE_STRING='libseccomp 2.4.3' PACKAGE_BUGREPORT='' PACKAGE_URL='' @@ -1347,7 +1347,7 @@ # Omit some internal or obsolete options to make the list less imposing. # This message is too long to be a string in the A/UX 3.1 sh. cat <<_ACEOF -\`configure' configures libseccomp 2.4.2 to adapt to many kinds of systems. +\`configure' configures libseccomp 2.4.3 to adapt to many kinds of systems. Usage: $0 [OPTION]... [VAR=VALUE]... @@ -1417,7 +1417,7 @@ if test -n "$ac_init_help"; then case $ac_init_help in - short | recursive ) echo "Configuration of libseccomp 2.4.2:";; + short | recursive ) echo "Configuration of libseccomp 2.4.3:";; esac cat <<\_ACEOF @@ -1531,7 +1531,7 @@ test -n "$ac_init_help" && exit $ac_status if $ac_init_version; then cat <<\_ACEOF -libseccomp configure 2.4.2 +libseccomp configure 2.4.3 generated by GNU Autoconf 2.69 Copyright (C) 2012 Free Software Foundation, Inc. @@ -1809,7 +1809,7 @@ This file contains any messages produced by compilers while running configure, to aid debugging if configure makes a mistake. -It was created by libseccomp $as_me 2.4.2, which was +It was created by libseccomp $as_me 2.4.3, which was generated by GNU Autoconf 2.69. Invocation command line was $ $0 $@ @@ -2679,7 +2679,7 @@ # Define the identity of the package. PACKAGE='libseccomp' - VERSION='2.4.2' + VERSION='2.4.3' cat >>confdefs.h <<_ACEOF @@ -13469,7 +13469,7 @@ # report actual input values of CONFIG_FILES etc. instead of their # values after options handling. ac_log=" -This file was extended by libseccomp $as_me 2.4.2, which was +This file was extended by libseccomp $as_me 2.4.3, which was generated by GNU Autoconf 2.69. Invocation command line was CONFIG_FILES = $CONFIG_FILES @@ -13535,7 +13535,7 @@ cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/\\\\&/g'`" ac_cs_version="\\ -libseccomp config.status 2.4.2 +libseccomp config.status 2.4.3 configured by $0, generated by GNU Autoconf 2.69, with options \\"\$ac_cs_config\\" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/configure.ac new/libseccomp-2.4.3/configure.ac --- old/libseccomp-2.4.2/configure.ac 2019-11-07 15:17:28.196643330 +0100 +++ new/libseccomp-2.4.3/configure.ac 2020-03-02 18:30:19.313687552 +0100 @@ -19,7 +19,7 @@ dnl #### dnl libseccomp defines dnl #### -AC_INIT([libseccomp], [2.4.2]) +AC_INIT([libseccomp], [2.4.3]) dnl #### dnl autoconf configuration diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/include/seccomp-syscalls.h new/libseccomp-2.4.3/include/seccomp-syscalls.h --- old/libseccomp-2.4.2/include/seccomp-syscalls.h 2019-11-07 15:17:18.523652691 +0100 +++ new/libseccomp-2.4.3/include/seccomp-syscalls.h 2020-03-02 17:19:57.855374588 +0100 @@ -272,6 +272,7 @@ #define __PNR_timerfd_gettime64 -10238 #define __PNR_timerfd_settime64 -10239 #define __PNR_utimensat_time64 -10240 +#define __PNR_ppoll -10241 /* * libseccomp syscall definitions @@ -1359,6 +1360,12 @@ #define __SNR_poll __PNR_poll #endif +#ifdef __NR_ppoll +#define __SNR_ppoll __NR_ppoll +#else +#define __SNR_ppoll __PNR_ppoll +#endif + #ifdef __NR_ppoll_time64 #define __SNR_ppoll_time64 __NR_ppoll_time64 #else diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/include/seccomp.h new/libseccomp-2.4.3/include/seccomp.h --- old/libseccomp-2.4.2/include/seccomp.h 2019-11-07 16:19:29.317178757 +0100 +++ new/libseccomp-2.4.3/include/seccomp.h 2020-03-02 18:45:58.549743128 +0100 @@ -38,7 +38,7 @@ #define SCMP_VER_MAJOR 2 #define SCMP_VER_MINOR 4 -#define SCMP_VER_MICRO 2 +#define SCMP_VER_MICRO 3 struct scmp_version { unsigned int major; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/src/arch-s390-syscalls.c new/libseccomp-2.4.3/src/arch-s390-syscalls.c --- old/libseccomp-2.4.2/src/arch-s390-syscalls.c 2019-11-07 15:17:18.550652665 +0100 +++ new/libseccomp-2.4.3/src/arch-s390-syscalls.c 2020-03-02 16:43:34.189033124 +0100 @@ -531,6 +531,14 @@ return __PNR_sendto; else if (strcmp(name, "setsockopt") == 0) return __PNR_setsockopt; + else if (strcmp(name, "shmat") == 0) + return __PNR_shmat; + else if (strcmp(name, "shmdt") == 0) + return __PNR_shmdt; + else if (strcmp(name, "shmget") == 0) + return __PNR_shmget; + else if (strcmp(name, "shmctl") == 0) + return __PNR_shmctl; else if (strcmp(name, "shutdown") == 0) return __PNR_shutdown; else if (strcmp(name, "socket") == 0) @@ -596,6 +604,14 @@ return "sendto"; else if (num == __PNR_setsockopt) return "setsockopt"; + else if (num == __PNR_shmat) + return "shmat"; + else if (num == __PNR_shmdt) + return "shmdt"; + else if (num == __PNR_shmget) + return "shmget"; + else if (num == __PNR_shmctl) + return "shmctl"; else if (num == __PNR_shutdown) return "shutdown"; else if (num == __PNR_socket) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/src/arch-s390x-syscalls.c new/libseccomp-2.4.3/src/arch-s390x-syscalls.c --- old/libseccomp-2.4.2/src/arch-s390x-syscalls.c 2019-11-07 15:17:18.551652664 +0100 +++ new/libseccomp-2.4.3/src/arch-s390x-syscalls.c 2020-03-02 16:43:34.189033124 +0100 @@ -531,6 +531,14 @@ return __PNR_sendto; else if (strcmp(name, "setsockopt") == 0) return __PNR_setsockopt; + else if (strcmp(name, "shmat") == 0) + return __PNR_shmat; + else if (strcmp(name, "shmdt") == 0) + return __PNR_shmdt; + else if (strcmp(name, "shmget") == 0) + return __PNR_shmget; + else if (strcmp(name, "shmctl") == 0) + return __PNR_shmctl; else if (strcmp(name, "shutdown") == 0) return __PNR_shutdown; else if (strcmp(name, "socket") == 0) @@ -596,6 +604,14 @@ return "sendto"; else if (num == __PNR_setsockopt) return "setsockopt"; + else if (num == __PNR_shmat) + return "shmat"; + else if (num == __PNR_shmdt) + return "shmdt"; + else if (num == __PNR_shmget) + return "shmget"; + else if (num == __PNR_shmctl) + return "shmctl"; else if (num == __PNR_shutdown) return "shutdown"; else if (num == __PNR_socket) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/15-basic-resolver.c new/libseccomp-2.4.3/tests/15-basic-resolver.c --- old/libseccomp-2.4.2/tests/15-basic-resolver.c 2019-11-07 15:17:18.596652621 +0100 +++ new/libseccomp-2.4.3/tests/15-basic-resolver.c 2020-03-02 17:19:57.857374579 +0100 @@ -55,15 +55,15 @@ unsigned int arch; char *name = NULL; - if (seccomp_syscall_resolve_name("open") != __NR_open) + if (seccomp_syscall_resolve_name("open") != __SNR_open) goto fail; - if (seccomp_syscall_resolve_name("read") != __NR_read) + if (seccomp_syscall_resolve_name("read") != __SNR_read) goto fail; if (seccomp_syscall_resolve_name("INVALID") != __NR_SCMP_ERROR) goto fail; rc = seccomp_syscall_resolve_name_rewrite(SCMP_ARCH_NATIVE, "openat"); - if (rc != __NR_openat) + if (rc != __SNR_openat) goto fail; while ((arch = arch_list[iter++]) != -1) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.c new/libseccomp-2.4.3/tests/52-basic-load.c --- old/libseccomp-2.4.2/tests/52-basic-load.c 1970-01-01 01:00:00.000000000 +0100 +++ new/libseccomp-2.4.3/tests/52-basic-load.c 2020-03-02 16:43:34.196033141 +0100 @@ -0,0 +1,48 @@ +/** + * Seccomp Library test program + * + * Copyright (c) 2019 Cisco Systems, Inc. <[email protected]> + * Author: Paul Moore <[email protected]> + */ + +/* + * This library is free software; you can redistribute it and/or modify it + * under the terms of version 2.1 of the GNU Lesser General Public License as + * published by the Free Software Foundation. + * + * This library is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License + * for more details. + * + * You should have received a copy of the GNU Lesser General Public License + * along with this library; if not, see <http://www.gnu.org/licenses>. + */ + +#include <errno.h> +#include <unistd.h> + +#include <seccomp.h> + +#include "util.h" + +int main(int argc, char *argv[]) +{ + int rc; + struct util_options opts; + scmp_filter_ctx ctx = NULL; + + rc = util_getopt(argc, argv, &opts); + if (rc < 0) + goto out; + + ctx = seccomp_init(SCMP_ACT_ALLOW); + if (ctx == NULL) + return ENOMEM; + + rc = seccomp_load(ctx); + +out: + seccomp_release(ctx); + return (rc < 0 ? -rc : rc); +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.py new/libseccomp-2.4.3/tests/52-basic-load.py --- old/libseccomp-2.4.2/tests/52-basic-load.py 1970-01-01 01:00:00.000000000 +0100 +++ new/libseccomp-2.4.3/tests/52-basic-load.py 2020-03-02 16:43:34.196033141 +0100 @@ -0,0 +1,38 @@ +#!/usr/bin/env python + +# +# Seccomp Library test program +# +# Copyright (c) 2019 Cisco Systems, Inc. <[email protected]> +# Author: Paul Moore <[email protected]> +# + +# +# This library is free software; you can redistribute it and/or modify it +# under the terms of version 2.1 of the GNU Lesser General Public License as +# published by the Free Software Foundation. +# +# This library is distributed in the hope that it will be useful, but WITHOUT +# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +# FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License +# for more details. +# +# You should have received a copy of the GNU Lesser General Public License +# along with this library; if not, see <http://www.gnu.org/licenses>. +# + +import argparse +import sys + +import util + +from seccomp import * + +def test(): + f = SyscallFilter(ALLOW) + f.load() + +test() + +# kate: syntax python; +# kate: indent-mode python; space-indent on; indent-width 4; mixedindent off; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.tests new/libseccomp-2.4.3/tests/52-basic-load.tests --- old/libseccomp-2.4.2/tests/52-basic-load.tests 1970-01-01 01:00:00.000000000 +0100 +++ new/libseccomp-2.4.3/tests/52-basic-load.tests 2020-03-02 16:43:34.196033141 +0100 @@ -0,0 +1,11 @@ +# +# libseccomp regression test automation data +# +# Copyright (c) 2013 Red Hat <[email protected]> +# Author: Paul Moore <[email protected]> +# + +test type: basic + +# Test command +52-basic-load diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/Makefile.am new/libseccomp-2.4.3/tests/Makefile.am --- old/libseccomp-2.4.2/tests/Makefile.am 2019-11-07 15:17:28.206643321 +0100 +++ new/libseccomp-2.4.3/tests/Makefile.am 2020-03-02 17:19:57.857374579 +0100 @@ -89,7 +89,8 @@ 47-live-kill_process \ 48-sim-32b_args \ 49-sim-64b_comparisons \ - 50-sim-hash_collision + 50-sim-hash_collision \ + 52-basic-load EXTRA_DIST_TESTPYTHON = \ util.py \ @@ -141,7 +142,8 @@ 47-live-kill_process.py \ 48-sim-32b_args.py \ 49-sim-64b_comparisons.py \ - 50-sim-hash_collision.py + 50-sim-hash_collision.py \ + 52-basic-load.py EXTRA_DIST_TESTCFGS = \ 01-sim-allow.tests \ @@ -193,7 +195,8 @@ 47-live-kill_process.tests \ 48-sim-32b_args.tests \ 49-sim-64b_comparisons.tests \ - 50-sim-hash_collision.tests + 50-sim-hash_collision.tests \ + 52-basic-load.tests EXTRA_DIST_TESTSCRIPTS = \ 38-basic-pfc_coverage.sh 38-basic-pfc_coverage.pfc diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/Makefile.in new/libseccomp-2.4.3/tests/Makefile.in --- old/libseccomp-2.4.2/tests/Makefile.in 2019-11-07 16:18:37.195121232 +0100 +++ new/libseccomp-2.4.3/tests/Makefile.in 2020-03-02 18:45:53.172765667 +0100 @@ -135,7 +135,7 @@ 44-live-a2_order$(EXEEXT) 45-sim-chain_code_coverage$(EXEEXT) \ 46-sim-kill_process$(EXEEXT) 47-live-kill_process$(EXEEXT) \ 48-sim-32b_args$(EXEEXT) 49-sim-64b_comparisons$(EXEEXT) \ - 50-sim-hash_collision$(EXEEXT) + 50-sim-hash_collision$(EXEEXT) 52-basic-load$(EXEEXT) EXTRA_PROGRAMS = 00-test$(EXEEXT) subdir = tests ACLOCAL_M4 = $(top_srcdir)/aclocal.m4 @@ -423,6 +423,11 @@ 50_sim_hash_collision_LDADD = $(LDADD) 50_sim_hash_collision_DEPENDENCIES = util.la ../src/libseccomp.la \ $(am__DEPENDENCIES_1) +52_basic_load_SOURCES = 52-basic-load.c +52_basic_load_OBJECTS = 52-basic-load.$(OBJEXT) +52_basic_load_LDADD = $(LDADD) +52_basic_load_DEPENDENCIES = util.la ../src/libseccomp.la \ + $(am__DEPENDENCIES_1) miniseq_SOURCES = miniseq.c miniseq_OBJECTS = miniseq.$(OBJEXT) miniseq_DEPENDENCIES = @@ -486,7 +491,8 @@ ./$(DEPDIR)/47-live-kill_process.Po \ ./$(DEPDIR)/48-sim-32b_args.Po \ ./$(DEPDIR)/49-sim-64b_comparisons.Po \ - ./$(DEPDIR)/50-sim-hash_collision.Po ./$(DEPDIR)/miniseq.Po \ + ./$(DEPDIR)/50-sim-hash_collision.Po \ + ./$(DEPDIR)/52-basic-load.Po ./$(DEPDIR)/miniseq.Po \ ./$(DEPDIR)/util.Plo am__mv = mv -f COMPILE = $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \ @@ -530,7 +536,8 @@ 43-sim-a2_order.c 44-live-a2_order.c \ 45-sim-chain_code_coverage.c 46-sim-kill_process.c \ 47-live-kill_process.c 48-sim-32b_args.c \ - 49-sim-64b_comparisons.c 50-sim-hash_collision.c miniseq.c + 49-sim-64b_comparisons.c 50-sim-hash_collision.c \ + 52-basic-load.c miniseq.c DIST_SOURCES = $(util_la_SOURCES) 01-sim-allow.c 02-sim-basic.c \ 03-sim-basic_chains.c 04-sim-multilevel_chains.c \ 05-sim-long_jumps.c 06-sim-actions.c 07-sim-db_bug_looping.c \ @@ -553,7 +560,8 @@ 43-sim-a2_order.c 44-live-a2_order.c \ 45-sim-chain_code_coverage.c 46-sim-kill_process.c \ 47-live-kill_process.c 48-sim-32b_args.c \ - 49-sim-64b_comparisons.c 50-sim-hash_collision.c miniseq.c + 49-sim-64b_comparisons.c 50-sim-hash_collision.c \ + 52-basic-load.c miniseq.c am__can_run_installinfo = \ case $$AM_UPDATE_INFO_DIR in \ n|no|NO) false;; \ @@ -803,7 +811,8 @@ 47-live-kill_process.py \ 48-sim-32b_args.py \ 49-sim-64b_comparisons.py \ - 50-sim-hash_collision.py + 50-sim-hash_collision.py \ + 52-basic-load.py EXTRA_DIST_TESTCFGS = \ 01-sim-allow.tests \ @@ -855,7 +864,8 @@ 47-live-kill_process.tests \ 48-sim-32b_args.tests \ 49-sim-64b_comparisons.tests \ - 50-sim-hash_collision.tests + 50-sim-hash_collision.tests \ + 52-basic-load.tests EXTRA_DIST_TESTSCRIPTS = \ 38-basic-pfc_coverage.sh 38-basic-pfc_coverage.pfc @@ -1131,6 +1141,10 @@ @rm -f 50-sim-hash_collision$(EXEEXT) $(AM_V_CCLD)$(LINK) $(50_sim_hash_collision_OBJECTS) $(50_sim_hash_collision_LDADD) $(LIBS) +52-basic-load$(EXEEXT): $(52_basic_load_OBJECTS) $(52_basic_load_DEPENDENCIES) $(EXTRA_52_basic_load_DEPENDENCIES) + @rm -f 52-basic-load$(EXEEXT) + $(AM_V_CCLD)$(LINK) $(52_basic_load_OBJECTS) $(52_basic_load_LDADD) $(LIBS) + miniseq$(EXEEXT): $(miniseq_OBJECTS) $(miniseq_DEPENDENCIES) $(EXTRA_miniseq_DEPENDENCIES) @rm -f miniseq$(EXEEXT) $(AM_V_CCLD)$(LINK) $(miniseq_OBJECTS) $(miniseq_LDADD) $(LIBS) @@ -1192,6 +1206,7 @@ @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/48-sim-32b_args.Po@am__quote@ # am--include-marker @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/49-sim-64b_comparisons.Po@am__quote@ # am--include-marker @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/50-sim-hash_collision.Po@am__quote@ # am--include-marker +@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/52-basic-load.Po@am__quote@ # am--include-marker @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/miniseq.Po@am__quote@ # am--include-marker @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/util.Plo@am__quote@ # am--include-marker @@ -1502,6 +1517,7 @@ -rm -f ./$(DEPDIR)/48-sim-32b_args.Po -rm -f ./$(DEPDIR)/49-sim-64b_comparisons.Po -rm -f ./$(DEPDIR)/50-sim-hash_collision.Po + -rm -f ./$(DEPDIR)/52-basic-load.Po -rm -f ./$(DEPDIR)/miniseq.Po -rm -f ./$(DEPDIR)/util.Plo -rm -f Makefile @@ -1600,6 +1616,7 @@ -rm -f ./$(DEPDIR)/48-sim-32b_args.Po -rm -f ./$(DEPDIR)/49-sim-64b_comparisons.Po -rm -f ./$(DEPDIR)/50-sim-hash_collision.Po + -rm -f ./$(DEPDIR)/52-basic-load.Po -rm -f ./$(DEPDIR)/miniseq.Po -rm -f ./$(DEPDIR)/util.Plo -rm -f Makefile diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tests/regression new/libseccomp-2.4.3/tests/regression --- old/libseccomp-2.4.2/tests/regression 2019-11-07 15:17:18.618652600 +0100 +++ new/libseccomp-2.4.3/tests/regression 2020-03-02 17:19:57.858374575 +0100 @@ -94,6 +94,7 @@ optional arguments: -h show this help message and exit -m MODE specified the test mode [c (default), python] + can also be set via LIBSECCOMP_TSTCFG_MODE_LIST env variable -a specifies all tests are to be run -b BATCH_NAME specifies batch of tests to be run -l [LOG] specifies log file to write test results to @@ -1025,6 +1026,9 @@ esac done +# use mode list from environment if provided +[[ -z $mode_list && -n $LIBSECCOMP_TSTCFG_MODE_LIST ]] && mode_list=$LIBSECCOMP_TSTCFG_MODE_LIST + # determine the mode test automatically if [[ -z $mode_list ]]; then # always perform the native c tests diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tools/Makefile.am new/libseccomp-2.4.3/tools/Makefile.am --- old/libseccomp-2.4.2/tools/Makefile.am 2019-11-07 15:17:18.619652598 +0100 +++ new/libseccomp-2.4.3/tools/Makefile.am 2020-03-02 16:43:34.197033143 +0100 @@ -35,10 +35,7 @@ scmp_api_level_SOURCES = scmp_api_level.c scmp_sys_resolver_LDADD = ../src/libseccomp.la -scmp_sys_resolver_LDFLAGS = -static scmp_arch_detect_LDADD = ../src/libseccomp.la -scmp_arch_detect_LDFLAGS = -static scmp_bpf_disasm_LDADD = util.la scmp_bpf_sim_LDADD = util.la scmp_api_level_LDADD = ../src/libseccomp.la -scmp_api_level_LDFLAGS = -static diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tools/Makefile.in new/libseccomp-2.4.3/tools/Makefile.in --- old/libseccomp-2.4.2/tools/Makefile.in 2019-11-07 16:18:37.237121278 +0100 +++ new/libseccomp-2.4.3/tools/Makefile.in 2020-03-02 18:45:53.194765575 +0100 @@ -139,17 +139,9 @@ am_scmp_api_level_OBJECTS = scmp_api_level.$(OBJEXT) scmp_api_level_OBJECTS = $(am_scmp_api_level_OBJECTS) scmp_api_level_DEPENDENCIES = ../src/libseccomp.la -scmp_api_level_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \ - $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \ - $(AM_CFLAGS) $(CFLAGS) $(scmp_api_level_LDFLAGS) $(LDFLAGS) -o \ - $@ scmp_arch_detect_SOURCES = scmp_arch_detect.c scmp_arch_detect_OBJECTS = scmp_arch_detect.$(OBJEXT) scmp_arch_detect_DEPENDENCIES = ../src/libseccomp.la -scmp_arch_detect_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \ - $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \ - $(AM_CFLAGS) $(CFLAGS) $(scmp_arch_detect_LDFLAGS) $(LDFLAGS) \ - -o $@ am_scmp_bpf_disasm_OBJECTS = scmp_bpf_disasm.$(OBJEXT) scmp_bpf_disasm_OBJECTS = $(am_scmp_bpf_disasm_OBJECTS) scmp_bpf_disasm_DEPENDENCIES = util.la @@ -159,10 +151,6 @@ scmp_sys_resolver_SOURCES = scmp_sys_resolver.c scmp_sys_resolver_OBJECTS = scmp_sys_resolver.$(OBJEXT) scmp_sys_resolver_DEPENDENCIES = ../src/libseccomp.la -scmp_sys_resolver_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \ - $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \ - $(AM_CFLAGS) $(CFLAGS) $(scmp_sys_resolver_LDFLAGS) $(LDFLAGS) \ - -o $@ AM_V_P = $(am__v_P_@AM_V@) am__v_P_ = $(am__v_P_@AM_DEFAULT_V@) am__v_P_0 = false @@ -383,13 +371,10 @@ scmp_bpf_sim_SOURCES = scmp_bpf_sim.c bpf.h util.h scmp_api_level_SOURCES = scmp_api_level.c scmp_sys_resolver_LDADD = ../src/libseccomp.la -scmp_sys_resolver_LDFLAGS = -static scmp_arch_detect_LDADD = ../src/libseccomp.la -scmp_arch_detect_LDFLAGS = -static scmp_bpf_disasm_LDADD = util.la scmp_bpf_sim_LDADD = util.la scmp_api_level_LDADD = ../src/libseccomp.la -scmp_api_level_LDFLAGS = -static all: all-am .SUFFIXES: @@ -498,11 +483,11 @@ scmp_api_level$(EXEEXT): $(scmp_api_level_OBJECTS) $(scmp_api_level_DEPENDENCIES) $(EXTRA_scmp_api_level_DEPENDENCIES) @rm -f scmp_api_level$(EXEEXT) - $(AM_V_CCLD)$(scmp_api_level_LINK) $(scmp_api_level_OBJECTS) $(scmp_api_level_LDADD) $(LIBS) + $(AM_V_CCLD)$(LINK) $(scmp_api_level_OBJECTS) $(scmp_api_level_LDADD) $(LIBS) scmp_arch_detect$(EXEEXT): $(scmp_arch_detect_OBJECTS) $(scmp_arch_detect_DEPENDENCIES) $(EXTRA_scmp_arch_detect_DEPENDENCIES) @rm -f scmp_arch_detect$(EXEEXT) - $(AM_V_CCLD)$(scmp_arch_detect_LINK) $(scmp_arch_detect_OBJECTS) $(scmp_arch_detect_LDADD) $(LIBS) + $(AM_V_CCLD)$(LINK) $(scmp_arch_detect_OBJECTS) $(scmp_arch_detect_LDADD) $(LIBS) scmp_bpf_disasm$(EXEEXT): $(scmp_bpf_disasm_OBJECTS) $(scmp_bpf_disasm_DEPENDENCIES) $(EXTRA_scmp_bpf_disasm_DEPENDENCIES) @rm -f scmp_bpf_disasm$(EXEEXT) @@ -514,7 +499,7 @@ scmp_sys_resolver$(EXEEXT): $(scmp_sys_resolver_OBJECTS) $(scmp_sys_resolver_DEPENDENCIES) $(EXTRA_scmp_sys_resolver_DEPENDENCIES) @rm -f scmp_sys_resolver$(EXEEXT) - $(AM_V_CCLD)$(scmp_sys_resolver_LINK) $(scmp_sys_resolver_OBJECTS) $(scmp_sys_resolver_LDADD) $(LIBS) + $(AM_V_CCLD)$(LINK) $(scmp_sys_resolver_OBJECTS) $(scmp_sys_resolver_LDADD) $(LIBS) mostlyclean-compile: -rm -f *.$(OBJEXT) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/libseccomp-2.4.2/tools/scmp_bpf_sim.c new/libseccomp-2.4.3/tools/scmp_bpf_sim.c --- old/libseccomp-2.4.2/tools/scmp_bpf_sim.c 2019-11-07 15:17:18.620652598 +0100 +++ new/libseccomp-2.4.3/tools/scmp_bpf_sim.c 2020-03-02 17:19:57.858374575 +0100 @@ -289,6 +289,8 @@ exit_fault(EINVAL); break; case 'f': + if (opt_file) + exit_fault(EINVAL); opt_file = strdup(optarg); if (opt_file == NULL) exit_fault(ENOMEM); ++++++ libseccomp.keyring ++++++ ++++ 725 lines (skipped) ++++ between libseccomp.keyring ++++ and /work/SRC/openSUSE:Factory/.libseccomp.new.3606/libseccomp.keyring
