Hello community,

here is the log from the commit of package libseccomp for openSUSE:Factory 
checked in at 2020-06-11 09:59:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/libseccomp (Old)
 and      /work/SRC/openSUSE:Factory/.libseccomp.new.3606 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "libseccomp"

Thu Jun 11 09:59:49 2020 rev:28 rq:811834 version:2.4.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/libseccomp/libseccomp.changes    2020-02-24 
15:49:43.599113809 +0100
+++ /work/SRC/openSUSE:Factory/.libseccomp.new.3606/libseccomp.changes  
2020-06-11 10:00:01.002255927 +0200
@@ -1,0 +2,13 @@
+Fri Jun  5 13:12:29 UTC 2020 - Jan Engelhardt <[email protected]>
+
+- Update to release 2.4.3
+  * Add list of authorized release signatures to README.md
+  * Fix multiplexing issue with s390/s390x shm* syscalls
+  * Remove the static flag from libseccomp tools compilation
+  * Add define for __SNR_ppoll
+  * Fix potential memory leak identified by clang in the
+    scmp_bpf_sim tool
+- Drop no-static.diff, libseccomp-fix_aarch64-test.patch,
+  SNR_ppoll.patch (merged)
+
+-------------------------------------------------------------------

Old:
----
  SNR_ppoll.patch
  libseccomp-2.4.2.tar.gz
  libseccomp-fix_aarch64-test.patch
  no-static.diff

New:
----
  libseccomp-2.4.3.tar.gz
  libseccomp-2.4.3.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ libseccomp.spec ++++++
--- /var/tmp/diff_new_pack.vZ82gd/_old  2020-06-11 10:00:02.446260578 +0200
+++ /var/tmp/diff_new_pack.vZ82gd/_new  2020-06-11 10:00:02.466260642 +0200
@@ -18,20 +18,16 @@
 
 %define lname   libseccomp2
 Name:           libseccomp
-Version:        2.4.2
+Version:        2.4.3
 Release:        0
 Summary:        A Seccomp (mode 2) helper library
 License:        LGPL-2.1-only
 Group:          Development/Libraries/C and C++
 URL:            https://github.com/seccomp/libseccomp
 Source:         
https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz
-# no fitting key found
-#Source2:        
https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz.asc
+Source2:        
https://github.com/seccomp/libseccomp/releases/download/v%version/libseccomp-%version.tar.gz.asc
 Source3:        %name.keyring
 Source99:       baselibs.conf
-Patch1:         no-static.diff
-Patch2:         libseccomp-fix_aarch64-test.patch
-Patch3:         SNR_ppoll.patch
 BuildRequires:  autoconf
 BuildRequires:  automake >= 1.11
 BuildRequires:  fdupes

++++++ libseccomp-2.4.2.tar.gz -> libseccomp-2.4.3.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/CHANGELOG 
new/libseccomp-2.4.3/CHANGELOG
--- old/libseccomp-2.4.2/CHANGELOG      2019-11-07 15:17:28.195643331 +0100
+++ new/libseccomp-2.4.3/CHANGELOG      2020-03-02 18:28:40.058107971 +0100
@@ -2,6 +2,16 @@
 ===============================================================================
 https://github.com/seccomp/libseccomp
 
+* Version 2.4.3 - March 4, 2020
+- Add list of authorized release signatures to README.md
+- Fix multiplexing issue with s390/s390x shm* syscalls
+- Remove the static flag from libseccomp tools compilation
+- Add define for __SNR_ppoll
+- Update our Travis CI configuration to use Ubuntu 18.04
+- Disable live python tests in Travis CI
+- Use default python, rather than nightly python, in TravisCI
+- Fix potential memory leak identified by clang in the scmp_bpf_sim tool
+
 * Version 2.4.2 - November 7, 2019
 - Update the syscall table for Linux v5.4-rc4
 - Stop defining __NR_x values for syscalls that don't exist.  Libseccomp
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/CREDITS new/libseccomp-2.4.3/CREDITS
--- old/libseccomp-2.4.2/CREDITS        2019-11-07 15:17:28.195643331 +0100
+++ new/libseccomp-2.4.3/CREDITS        2020-03-02 18:14:08.813783903 +0100
@@ -7,11 +7,13 @@
 Ashley Lai <[email protected]>
 Bogdan Purcareata <[email protected]>
 Brian Cain <[email protected]>
+Chris Waldon <[email protected]>
 Colin Walters <[email protected]>
 Corey Bryant <[email protected]>
 David Drysdale <[email protected]>
 Eduardo Otubo <[email protected]>
 Eric Paris <[email protected]>
+Fabrice Fontaine <[email protected]>
 Felix Abecassis <[email protected]>
 Felix Geyer <[email protected]>
 Heiko Carstens <[email protected]>
@@ -34,6 +36,7 @@
 Michael Forney <[email protected]>
 Mike Frysinger <[email protected]>
 Mike Strosaker <[email protected]>
+Miroslav Lichvar <[email protected]>
 Paul Moore <[email protected]>
 Serge Hallyn <[email protected]>
 Stéphane Graber <[email protected]>
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/README.md 
new/libseccomp-2.4.3/README.md
--- old/libseccomp-2.4.2/README.md      2019-11-07 15:17:18.502652712 +0100
+++ new/libseccomp-2.4.3/README.md      2020-03-02 16:43:34.185033115 +0100
@@ -63,6 +63,24 @@
 Those who are interested in contributing to the the project are encouraged to
 read the CONTRIBUTING in the top level directory.
 
+## Verifying Release Tarballs
+
+Before use you should verify the downloaded release tarballs and checksums
+using the detached signatures supplied as part of the release; the detached
+signature files are the "*.asc" files.  If you have GnuPG installed you can
+verify detached signatures using the following command:
+
+       # gpg --verify file.asc file
+
+At present, only the following keys are authorized to sign official libseccomp
+releases:
+
+       Paul Moore <[email protected]>
+       7100 AADF AE6E 6E94 0D2E  0AD6 55E4 5A5A E8CA 7C8A
+
+       Tom Hromatka <[email protected]>
+       47A6 8FCE 37C7 D702 4FD6  5E11 356C E62C 2B52 4099
+
 ## Building and Installing the Library
 
 If you are building the libseccomp library from an official release tarball,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/configure 
new/libseccomp-2.4.3/configure
--- old/libseccomp-2.4.2/configure      2019-11-07 16:18:34.850118644 +0100
+++ new/libseccomp-2.4.3/configure      2020-03-02 18:45:52.372769020 +0100
@@ -1,6 +1,6 @@
 #! /bin/sh
 # Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.69 for libseccomp 2.4.2.
+# Generated by GNU Autoconf 2.69 for libseccomp 2.4.3.
 #
 #
 # Copyright (C) 1992-1996, 1998-2012 Free Software Foundation, Inc.
@@ -587,8 +587,8 @@
 # Identity of this package.
 PACKAGE_NAME='libseccomp'
 PACKAGE_TARNAME='libseccomp'
-PACKAGE_VERSION='2.4.2'
-PACKAGE_STRING='libseccomp 2.4.2'
+PACKAGE_VERSION='2.4.3'
+PACKAGE_STRING='libseccomp 2.4.3'
 PACKAGE_BUGREPORT=''
 PACKAGE_URL=''
 
@@ -1347,7 +1347,7 @@
   # Omit some internal or obsolete options to make the list less imposing.
   # This message is too long to be a string in the A/UX 3.1 sh.
   cat <<_ACEOF
-\`configure' configures libseccomp 2.4.2 to adapt to many kinds of systems.
+\`configure' configures libseccomp 2.4.3 to adapt to many kinds of systems.
 
 Usage: $0 [OPTION]... [VAR=VALUE]...
 
@@ -1417,7 +1417,7 @@
 
 if test -n "$ac_init_help"; then
   case $ac_init_help in
-     short | recursive ) echo "Configuration of libseccomp 2.4.2:";;
+     short | recursive ) echo "Configuration of libseccomp 2.4.3:";;
    esac
   cat <<\_ACEOF
 
@@ -1531,7 +1531,7 @@
 test -n "$ac_init_help" && exit $ac_status
 if $ac_init_version; then
   cat <<\_ACEOF
-libseccomp configure 2.4.2
+libseccomp configure 2.4.3
 generated by GNU Autoconf 2.69
 
 Copyright (C) 2012 Free Software Foundation, Inc.
@@ -1809,7 +1809,7 @@
 This file contains any messages produced by compilers while
 running configure, to aid debugging if configure makes a mistake.
 
-It was created by libseccomp $as_me 2.4.2, which was
+It was created by libseccomp $as_me 2.4.3, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   $ $0 $@
@@ -2679,7 +2679,7 @@
 
 # Define the identity of the package.
  PACKAGE='libseccomp'
- VERSION='2.4.2'
+ VERSION='2.4.3'
 
 
 cat >>confdefs.h <<_ACEOF
@@ -13469,7 +13469,7 @@
 # report actual input values of CONFIG_FILES etc. instead of their
 # values after options handling.
 ac_log="
-This file was extended by libseccomp $as_me 2.4.2, which was
+This file was extended by libseccomp $as_me 2.4.3, which was
 generated by GNU Autoconf 2.69.  Invocation command line was
 
   CONFIG_FILES    = $CONFIG_FILES
@@ -13535,7 +13535,7 @@
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
 ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; 
s/[\\""\`\$]/\\\\&/g'`"
 ac_cs_version="\\
-libseccomp config.status 2.4.2
+libseccomp config.status 2.4.3
 configured by $0, generated by GNU Autoconf 2.69,
   with options \\"\$ac_cs_config\\"
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/configure.ac 
new/libseccomp-2.4.3/configure.ac
--- old/libseccomp-2.4.2/configure.ac   2019-11-07 15:17:28.196643330 +0100
+++ new/libseccomp-2.4.3/configure.ac   2020-03-02 18:30:19.313687552 +0100
@@ -19,7 +19,7 @@
 dnl ####
 dnl libseccomp defines
 dnl ####
-AC_INIT([libseccomp], [2.4.2])
+AC_INIT([libseccomp], [2.4.3])
 
 dnl ####
 dnl autoconf configuration
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/include/seccomp-syscalls.h 
new/libseccomp-2.4.3/include/seccomp-syscalls.h
--- old/libseccomp-2.4.2/include/seccomp-syscalls.h     2019-11-07 
15:17:18.523652691 +0100
+++ new/libseccomp-2.4.3/include/seccomp-syscalls.h     2020-03-02 
17:19:57.855374588 +0100
@@ -272,6 +272,7 @@
 #define __PNR_timerfd_gettime64                        -10238
 #define __PNR_timerfd_settime64                        -10239
 #define __PNR_utimensat_time64                 -10240
+#define __PNR_ppoll                            -10241
 
 /*
  * libseccomp syscall definitions
@@ -1359,6 +1360,12 @@
 #define __SNR_poll                     __PNR_poll
 #endif
 
+#ifdef __NR_ppoll
+#define __SNR_ppoll                    __NR_ppoll
+#else
+#define __SNR_ppoll                    __PNR_ppoll
+#endif
+
 #ifdef __NR_ppoll_time64
 #define __SNR_ppoll_time64             __NR_ppoll_time64
 #else
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/include/seccomp.h 
new/libseccomp-2.4.3/include/seccomp.h
--- old/libseccomp-2.4.2/include/seccomp.h      2019-11-07 16:19:29.317178757 
+0100
+++ new/libseccomp-2.4.3/include/seccomp.h      2020-03-02 18:45:58.549743128 
+0100
@@ -38,7 +38,7 @@
 
 #define SCMP_VER_MAJOR         2
 #define SCMP_VER_MINOR         4
-#define SCMP_VER_MICRO         2
+#define SCMP_VER_MICRO         3
 
 struct scmp_version {
        unsigned int major;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/src/arch-s390-syscalls.c 
new/libseccomp-2.4.3/src/arch-s390-syscalls.c
--- old/libseccomp-2.4.2/src/arch-s390-syscalls.c       2019-11-07 
15:17:18.550652665 +0100
+++ new/libseccomp-2.4.3/src/arch-s390-syscalls.c       2020-03-02 
16:43:34.189033124 +0100
@@ -531,6 +531,14 @@
                return __PNR_sendto;
        else if (strcmp(name, "setsockopt") == 0)
                return __PNR_setsockopt;
+       else if (strcmp(name, "shmat") == 0)
+               return __PNR_shmat;
+       else if (strcmp(name, "shmdt") == 0)
+               return __PNR_shmdt;
+       else if (strcmp(name, "shmget") == 0)
+               return __PNR_shmget;
+       else if (strcmp(name, "shmctl") == 0)
+               return __PNR_shmctl;
        else if (strcmp(name, "shutdown") == 0)
                return __PNR_shutdown;
        else if (strcmp(name, "socket") == 0)
@@ -596,6 +604,14 @@
                return "sendto";
        else if (num == __PNR_setsockopt)
                return "setsockopt";
+       else if (num == __PNR_shmat)
+               return "shmat";
+       else if (num == __PNR_shmdt)
+               return "shmdt";
+       else if (num == __PNR_shmget)
+               return "shmget";
+       else if (num == __PNR_shmctl)
+               return "shmctl";
        else if (num == __PNR_shutdown)
                return "shutdown";
        else if (num == __PNR_socket)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/src/arch-s390x-syscalls.c 
new/libseccomp-2.4.3/src/arch-s390x-syscalls.c
--- old/libseccomp-2.4.2/src/arch-s390x-syscalls.c      2019-11-07 
15:17:18.551652664 +0100
+++ new/libseccomp-2.4.3/src/arch-s390x-syscalls.c      2020-03-02 
16:43:34.189033124 +0100
@@ -531,6 +531,14 @@
                return __PNR_sendto;
        else if (strcmp(name, "setsockopt") == 0)
                return __PNR_setsockopt;
+       else if (strcmp(name, "shmat") == 0)
+               return __PNR_shmat;
+       else if (strcmp(name, "shmdt") == 0)
+               return __PNR_shmdt;
+       else if (strcmp(name, "shmget") == 0)
+               return __PNR_shmget;
+       else if (strcmp(name, "shmctl") == 0)
+               return __PNR_shmctl;
        else if (strcmp(name, "shutdown") == 0)
                return __PNR_shutdown;
        else if (strcmp(name, "socket") == 0)
@@ -596,6 +604,14 @@
                return "sendto";
        else if (num == __PNR_setsockopt)
                return "setsockopt";
+       else if (num == __PNR_shmat)
+               return "shmat";
+       else if (num == __PNR_shmdt)
+               return "shmdt";
+       else if (num == __PNR_shmget)
+               return "shmget";
+       else if (num == __PNR_shmctl)
+               return "shmctl";
        else if (num == __PNR_shutdown)
                return "shutdown";
        else if (num == __PNR_socket)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/15-basic-resolver.c 
new/libseccomp-2.4.3/tests/15-basic-resolver.c
--- old/libseccomp-2.4.2/tests/15-basic-resolver.c      2019-11-07 
15:17:18.596652621 +0100
+++ new/libseccomp-2.4.3/tests/15-basic-resolver.c      2020-03-02 
17:19:57.857374579 +0100
@@ -55,15 +55,15 @@
        unsigned int arch;
        char *name = NULL;
 
-       if (seccomp_syscall_resolve_name("open") != __NR_open)
+       if (seccomp_syscall_resolve_name("open") != __SNR_open)
                goto fail;
-       if (seccomp_syscall_resolve_name("read") != __NR_read)
+       if (seccomp_syscall_resolve_name("read") != __SNR_read)
                goto fail;
        if (seccomp_syscall_resolve_name("INVALID") != __NR_SCMP_ERROR)
                goto fail;
 
        rc = seccomp_syscall_resolve_name_rewrite(SCMP_ARCH_NATIVE, "openat");
-       if (rc != __NR_openat)
+       if (rc != __SNR_openat)
                goto fail;
 
        while ((arch = arch_list[iter++]) != -1) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.c 
new/libseccomp-2.4.3/tests/52-basic-load.c
--- old/libseccomp-2.4.2/tests/52-basic-load.c  1970-01-01 01:00:00.000000000 
+0100
+++ new/libseccomp-2.4.3/tests/52-basic-load.c  2020-03-02 16:43:34.196033141 
+0100
@@ -0,0 +1,48 @@
+/**
+ * Seccomp Library test program
+ *
+ * Copyright (c) 2019 Cisco Systems, Inc. <[email protected]>
+ * Author: Paul Moore <[email protected]>
+ */
+
+/*
+ * This library is free software; you can redistribute it and/or modify it
+ * under the terms of version 2.1 of the GNU Lesser General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This library is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public License
+ * for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this library; if not, see <http://www.gnu.org/licenses>.
+ */
+
+#include <errno.h>
+#include <unistd.h>
+
+#include <seccomp.h>
+
+#include "util.h"
+
+int main(int argc, char *argv[])
+{
+       int rc;
+       struct util_options opts;
+       scmp_filter_ctx ctx = NULL;
+
+       rc = util_getopt(argc, argv, &opts);
+       if (rc < 0)
+               goto out;
+
+       ctx = seccomp_init(SCMP_ACT_ALLOW);
+       if (ctx == NULL)
+               return ENOMEM;
+
+       rc = seccomp_load(ctx);
+
+out:
+       seccomp_release(ctx);
+       return (rc < 0 ? -rc : rc);
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.py 
new/libseccomp-2.4.3/tests/52-basic-load.py
--- old/libseccomp-2.4.2/tests/52-basic-load.py 1970-01-01 01:00:00.000000000 
+0100
+++ new/libseccomp-2.4.3/tests/52-basic-load.py 2020-03-02 16:43:34.196033141 
+0100
@@ -0,0 +1,38 @@
+#!/usr/bin/env python
+
+#
+# Seccomp Library test program
+#
+# Copyright (c) 2019 Cisco Systems, Inc. <[email protected]>
+# Author: Paul Moore <[email protected]>
+#
+
+#
+# This library is free software; you can redistribute it and/or modify it
+# under the terms of version 2.1 of the GNU Lesser General Public License as
+# published by the Free Software Foundation.
+#
+# This library is distributed in the hope that it will be useful, but WITHOUT
+# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public License
+# for more details.
+#
+# You should have received a copy of the GNU Lesser General Public License
+# along with this library; if not, see <http://www.gnu.org/licenses>.
+#
+
+import argparse
+import sys
+
+import util
+
+from seccomp import *
+
+def test():
+    f = SyscallFilter(ALLOW)
+    f.load()
+
+test()
+
+# kate: syntax python;
+# kate: indent-mode python; space-indent on; indent-width 4; mixedindent off;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/52-basic-load.tests 
new/libseccomp-2.4.3/tests/52-basic-load.tests
--- old/libseccomp-2.4.2/tests/52-basic-load.tests      1970-01-01 
01:00:00.000000000 +0100
+++ new/libseccomp-2.4.3/tests/52-basic-load.tests      2020-03-02 
16:43:34.196033141 +0100
@@ -0,0 +1,11 @@
+#
+# libseccomp regression test automation data
+#
+# Copyright (c) 2013 Red Hat <[email protected]>
+# Author: Paul Moore <[email protected]>
+#
+
+test type: basic
+
+# Test command
+52-basic-load
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/Makefile.am 
new/libseccomp-2.4.3/tests/Makefile.am
--- old/libseccomp-2.4.2/tests/Makefile.am      2019-11-07 15:17:28.206643321 
+0100
+++ new/libseccomp-2.4.3/tests/Makefile.am      2020-03-02 17:19:57.857374579 
+0100
@@ -89,7 +89,8 @@
        47-live-kill_process \
        48-sim-32b_args \
        49-sim-64b_comparisons \
-       50-sim-hash_collision
+       50-sim-hash_collision \
+       52-basic-load
 
 EXTRA_DIST_TESTPYTHON = \
        util.py \
@@ -141,7 +142,8 @@
        47-live-kill_process.py \
        48-sim-32b_args.py \
        49-sim-64b_comparisons.py \
-       50-sim-hash_collision.py
+       50-sim-hash_collision.py \
+       52-basic-load.py
 
 EXTRA_DIST_TESTCFGS = \
        01-sim-allow.tests \
@@ -193,7 +195,8 @@
        47-live-kill_process.tests \
        48-sim-32b_args.tests \
        49-sim-64b_comparisons.tests \
-       50-sim-hash_collision.tests
+       50-sim-hash_collision.tests \
+       52-basic-load.tests
 
 EXTRA_DIST_TESTSCRIPTS = \
        38-basic-pfc_coverage.sh 38-basic-pfc_coverage.pfc
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/Makefile.in 
new/libseccomp-2.4.3/tests/Makefile.in
--- old/libseccomp-2.4.2/tests/Makefile.in      2019-11-07 16:18:37.195121232 
+0100
+++ new/libseccomp-2.4.3/tests/Makefile.in      2020-03-02 18:45:53.172765667 
+0100
@@ -135,7 +135,7 @@
        44-live-a2_order$(EXEEXT) 45-sim-chain_code_coverage$(EXEEXT) \
        46-sim-kill_process$(EXEEXT) 47-live-kill_process$(EXEEXT) \
        48-sim-32b_args$(EXEEXT) 49-sim-64b_comparisons$(EXEEXT) \
-       50-sim-hash_collision$(EXEEXT)
+       50-sim-hash_collision$(EXEEXT) 52-basic-load$(EXEEXT)
 EXTRA_PROGRAMS = 00-test$(EXEEXT)
 subdir = tests
 ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
@@ -423,6 +423,11 @@
 50_sim_hash_collision_LDADD = $(LDADD)
 50_sim_hash_collision_DEPENDENCIES = util.la ../src/libseccomp.la \
        $(am__DEPENDENCIES_1)
+52_basic_load_SOURCES = 52-basic-load.c
+52_basic_load_OBJECTS = 52-basic-load.$(OBJEXT)
+52_basic_load_LDADD = $(LDADD)
+52_basic_load_DEPENDENCIES = util.la ../src/libseccomp.la \
+       $(am__DEPENDENCIES_1)
 miniseq_SOURCES = miniseq.c
 miniseq_OBJECTS = miniseq.$(OBJEXT)
 miniseq_DEPENDENCIES =
@@ -486,7 +491,8 @@
        ./$(DEPDIR)/47-live-kill_process.Po \
        ./$(DEPDIR)/48-sim-32b_args.Po \
        ./$(DEPDIR)/49-sim-64b_comparisons.Po \
-       ./$(DEPDIR)/50-sim-hash_collision.Po ./$(DEPDIR)/miniseq.Po \
+       ./$(DEPDIR)/50-sim-hash_collision.Po \
+       ./$(DEPDIR)/52-basic-load.Po ./$(DEPDIR)/miniseq.Po \
        ./$(DEPDIR)/util.Plo
 am__mv = mv -f
 COMPILE = $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
@@ -530,7 +536,8 @@
        43-sim-a2_order.c 44-live-a2_order.c \
        45-sim-chain_code_coverage.c 46-sim-kill_process.c \
        47-live-kill_process.c 48-sim-32b_args.c \
-       49-sim-64b_comparisons.c 50-sim-hash_collision.c miniseq.c
+       49-sim-64b_comparisons.c 50-sim-hash_collision.c \
+       52-basic-load.c miniseq.c
 DIST_SOURCES = $(util_la_SOURCES) 01-sim-allow.c 02-sim-basic.c \
        03-sim-basic_chains.c 04-sim-multilevel_chains.c \
        05-sim-long_jumps.c 06-sim-actions.c 07-sim-db_bug_looping.c \
@@ -553,7 +560,8 @@
        43-sim-a2_order.c 44-live-a2_order.c \
        45-sim-chain_code_coverage.c 46-sim-kill_process.c \
        47-live-kill_process.c 48-sim-32b_args.c \
-       49-sim-64b_comparisons.c 50-sim-hash_collision.c miniseq.c
+       49-sim-64b_comparisons.c 50-sim-hash_collision.c \
+       52-basic-load.c miniseq.c
 am__can_run_installinfo = \
   case $$AM_UPDATE_INFO_DIR in \
     n|no|NO) false;; \
@@ -803,7 +811,8 @@
        47-live-kill_process.py \
        48-sim-32b_args.py \
        49-sim-64b_comparisons.py \
-       50-sim-hash_collision.py
+       50-sim-hash_collision.py \
+       52-basic-load.py
 
 EXTRA_DIST_TESTCFGS = \
        01-sim-allow.tests \
@@ -855,7 +864,8 @@
        47-live-kill_process.tests \
        48-sim-32b_args.tests \
        49-sim-64b_comparisons.tests \
-       50-sim-hash_collision.tests
+       50-sim-hash_collision.tests \
+       52-basic-load.tests
 
 EXTRA_DIST_TESTSCRIPTS = \
        38-basic-pfc_coverage.sh 38-basic-pfc_coverage.pfc
@@ -1131,6 +1141,10 @@
        @rm -f 50-sim-hash_collision$(EXEEXT)
        $(AM_V_CCLD)$(LINK) $(50_sim_hash_collision_OBJECTS) 
$(50_sim_hash_collision_LDADD) $(LIBS)
 
+52-basic-load$(EXEEXT): $(52_basic_load_OBJECTS) $(52_basic_load_DEPENDENCIES) 
$(EXTRA_52_basic_load_DEPENDENCIES) 
+       @rm -f 52-basic-load$(EXEEXT)
+       $(AM_V_CCLD)$(LINK) $(52_basic_load_OBJECTS) $(52_basic_load_LDADD) 
$(LIBS)
+
 miniseq$(EXEEXT): $(miniseq_OBJECTS) $(miniseq_DEPENDENCIES) 
$(EXTRA_miniseq_DEPENDENCIES) 
        @rm -f miniseq$(EXEEXT)
        $(AM_V_CCLD)$(LINK) $(miniseq_OBJECTS) $(miniseq_LDADD) $(LIBS)
@@ -1192,6 +1206,7 @@
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/48-sim-32b_args.Po@am__quote@ 
# am--include-marker
 @AMDEP_TRUE@@am__include@ 
@am__quote@./$(DEPDIR)/49-sim-64b_comparisons.Po@am__quote@ # am--include-marker
 @AMDEP_TRUE@@am__include@ 
@am__quote@./$(DEPDIR)/50-sim-hash_collision.Po@am__quote@ # am--include-marker
+@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/52-basic-load.Po@am__quote@ # 
am--include-marker
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/miniseq.Po@am__quote@ # 
am--include-marker
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/util.Plo@am__quote@ # 
am--include-marker
 
@@ -1502,6 +1517,7 @@
        -rm -f ./$(DEPDIR)/48-sim-32b_args.Po
        -rm -f ./$(DEPDIR)/49-sim-64b_comparisons.Po
        -rm -f ./$(DEPDIR)/50-sim-hash_collision.Po
+       -rm -f ./$(DEPDIR)/52-basic-load.Po
        -rm -f ./$(DEPDIR)/miniseq.Po
        -rm -f ./$(DEPDIR)/util.Plo
        -rm -f Makefile
@@ -1600,6 +1616,7 @@
        -rm -f ./$(DEPDIR)/48-sim-32b_args.Po
        -rm -f ./$(DEPDIR)/49-sim-64b_comparisons.Po
        -rm -f ./$(DEPDIR)/50-sim-hash_collision.Po
+       -rm -f ./$(DEPDIR)/52-basic-load.Po
        -rm -f ./$(DEPDIR)/miniseq.Po
        -rm -f ./$(DEPDIR)/util.Plo
        -rm -f Makefile
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tests/regression 
new/libseccomp-2.4.3/tests/regression
--- old/libseccomp-2.4.2/tests/regression       2019-11-07 15:17:18.618652600 
+0100
+++ new/libseccomp-2.4.3/tests/regression       2020-03-02 17:19:57.858374575 
+0100
@@ -94,6 +94,7 @@
 optional arguments:
   -h             show this help message and exit
   -m MODE        specified the test mode [c (default), python]
+                  can also be set via LIBSECCOMP_TSTCFG_MODE_LIST env variable
   -a             specifies all tests are to be run
   -b BATCH_NAME  specifies batch of tests to be run
   -l [LOG]       specifies log file to write test results to
@@ -1025,6 +1026,9 @@
        esac
 done
 
+# use mode list from environment if provided
+[[ -z $mode_list && -n $LIBSECCOMP_TSTCFG_MODE_LIST ]] && 
mode_list=$LIBSECCOMP_TSTCFG_MODE_LIST
+
 # determine the mode test automatically
 if [[ -z $mode_list ]]; then
        # always perform the native c tests
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tools/Makefile.am 
new/libseccomp-2.4.3/tools/Makefile.am
--- old/libseccomp-2.4.2/tools/Makefile.am      2019-11-07 15:17:18.619652598 
+0100
+++ new/libseccomp-2.4.3/tools/Makefile.am      2020-03-02 16:43:34.197033143 
+0100
@@ -35,10 +35,7 @@
 scmp_api_level_SOURCES = scmp_api_level.c
 
 scmp_sys_resolver_LDADD = ../src/libseccomp.la
-scmp_sys_resolver_LDFLAGS = -static
 scmp_arch_detect_LDADD = ../src/libseccomp.la
-scmp_arch_detect_LDFLAGS = -static
 scmp_bpf_disasm_LDADD = util.la
 scmp_bpf_sim_LDADD = util.la
 scmp_api_level_LDADD = ../src/libseccomp.la
-scmp_api_level_LDFLAGS = -static
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tools/Makefile.in 
new/libseccomp-2.4.3/tools/Makefile.in
--- old/libseccomp-2.4.2/tools/Makefile.in      2019-11-07 16:18:37.237121278 
+0100
+++ new/libseccomp-2.4.3/tools/Makefile.in      2020-03-02 18:45:53.194765575 
+0100
@@ -139,17 +139,9 @@
 am_scmp_api_level_OBJECTS = scmp_api_level.$(OBJEXT)
 scmp_api_level_OBJECTS = $(am_scmp_api_level_OBJECTS)
 scmp_api_level_DEPENDENCIES = ../src/libseccomp.la
-scmp_api_level_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \
-       $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \
-       $(AM_CFLAGS) $(CFLAGS) $(scmp_api_level_LDFLAGS) $(LDFLAGS) -o \
-       $@
 scmp_arch_detect_SOURCES = scmp_arch_detect.c
 scmp_arch_detect_OBJECTS = scmp_arch_detect.$(OBJEXT)
 scmp_arch_detect_DEPENDENCIES = ../src/libseccomp.la
-scmp_arch_detect_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \
-       $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \
-       $(AM_CFLAGS) $(CFLAGS) $(scmp_arch_detect_LDFLAGS) $(LDFLAGS) \
-       -o $@
 am_scmp_bpf_disasm_OBJECTS = scmp_bpf_disasm.$(OBJEXT)
 scmp_bpf_disasm_OBJECTS = $(am_scmp_bpf_disasm_OBJECTS)
 scmp_bpf_disasm_DEPENDENCIES = util.la
@@ -159,10 +151,6 @@
 scmp_sys_resolver_SOURCES = scmp_sys_resolver.c
 scmp_sys_resolver_OBJECTS = scmp_sys_resolver.$(OBJEXT)
 scmp_sys_resolver_DEPENDENCIES = ../src/libseccomp.la
-scmp_sys_resolver_LINK = $(LIBTOOL) $(AM_V_lt) --tag=CC \
-       $(AM_LIBTOOLFLAGS) $(LIBTOOLFLAGS) --mode=link $(CCLD) \
-       $(AM_CFLAGS) $(CFLAGS) $(scmp_sys_resolver_LDFLAGS) $(LDFLAGS) \
-       -o $@
 AM_V_P = $(am__v_P_@AM_V@)
 am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
 am__v_P_0 = false
@@ -383,13 +371,10 @@
 scmp_bpf_sim_SOURCES = scmp_bpf_sim.c bpf.h util.h
 scmp_api_level_SOURCES = scmp_api_level.c
 scmp_sys_resolver_LDADD = ../src/libseccomp.la
-scmp_sys_resolver_LDFLAGS = -static
 scmp_arch_detect_LDADD = ../src/libseccomp.la
-scmp_arch_detect_LDFLAGS = -static
 scmp_bpf_disasm_LDADD = util.la
 scmp_bpf_sim_LDADD = util.la
 scmp_api_level_LDADD = ../src/libseccomp.la
-scmp_api_level_LDFLAGS = -static
 all: all-am
 
 .SUFFIXES:
@@ -498,11 +483,11 @@
 
 scmp_api_level$(EXEEXT): $(scmp_api_level_OBJECTS) 
$(scmp_api_level_DEPENDENCIES) $(EXTRA_scmp_api_level_DEPENDENCIES) 
        @rm -f scmp_api_level$(EXEEXT)
-       $(AM_V_CCLD)$(scmp_api_level_LINK) $(scmp_api_level_OBJECTS) 
$(scmp_api_level_LDADD) $(LIBS)
+       $(AM_V_CCLD)$(LINK) $(scmp_api_level_OBJECTS) $(scmp_api_level_LDADD) 
$(LIBS)
 
 scmp_arch_detect$(EXEEXT): $(scmp_arch_detect_OBJECTS) 
$(scmp_arch_detect_DEPENDENCIES) $(EXTRA_scmp_arch_detect_DEPENDENCIES) 
        @rm -f scmp_arch_detect$(EXEEXT)
-       $(AM_V_CCLD)$(scmp_arch_detect_LINK) $(scmp_arch_detect_OBJECTS) 
$(scmp_arch_detect_LDADD) $(LIBS)
+       $(AM_V_CCLD)$(LINK) $(scmp_arch_detect_OBJECTS) 
$(scmp_arch_detect_LDADD) $(LIBS)
 
 scmp_bpf_disasm$(EXEEXT): $(scmp_bpf_disasm_OBJECTS) 
$(scmp_bpf_disasm_DEPENDENCIES) $(EXTRA_scmp_bpf_disasm_DEPENDENCIES) 
        @rm -f scmp_bpf_disasm$(EXEEXT)
@@ -514,7 +499,7 @@
 
 scmp_sys_resolver$(EXEEXT): $(scmp_sys_resolver_OBJECTS) 
$(scmp_sys_resolver_DEPENDENCIES) $(EXTRA_scmp_sys_resolver_DEPENDENCIES) 
        @rm -f scmp_sys_resolver$(EXEEXT)
-       $(AM_V_CCLD)$(scmp_sys_resolver_LINK) $(scmp_sys_resolver_OBJECTS) 
$(scmp_sys_resolver_LDADD) $(LIBS)
+       $(AM_V_CCLD)$(LINK) $(scmp_sys_resolver_OBJECTS) 
$(scmp_sys_resolver_LDADD) $(LIBS)
 
 mostlyclean-compile:
        -rm -f *.$(OBJEXT)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/libseccomp-2.4.2/tools/scmp_bpf_sim.c 
new/libseccomp-2.4.3/tools/scmp_bpf_sim.c
--- old/libseccomp-2.4.2/tools/scmp_bpf_sim.c   2019-11-07 15:17:18.620652598 
+0100
+++ new/libseccomp-2.4.3/tools/scmp_bpf_sim.c   2020-03-02 17:19:57.858374575 
+0100
@@ -289,6 +289,8 @@
                                exit_fault(EINVAL);
                        break;
                case 'f':
+                       if (opt_file)
+                               exit_fault(EINVAL);
                        opt_file = strdup(optarg);
                        if (opt_file == NULL)
                                exit_fault(ENOMEM);

++++++ libseccomp.keyring ++++++
++++ 725 lines (skipped)
++++ between libseccomp.keyring
++++ and /work/SRC/openSUSE:Factory/.libseccomp.new.3606/libseccomp.keyring


Reply via email to