diff options
author | Michael Olbrich <m.olbrich@pengutronix.de> | 2020-05-06 08:34:41 +0200 |
---|---|---|
committer | Michael Olbrich <m.olbrich@pengutronix.de> | 2020-05-08 09:05:18 +0200 |
commit | e63ecc69e7ec211c830aea705aa429d66d923d80 (patch) | |
tree | 8b80d3c793a4fa10c52282a2ebe7946086c4209d | |
parent | d69cec0aadfa65148ae07220bedd4b4d7191f9dc (diff) | |
download | ptxdist-e63ecc69e7ec211c830aea705aa429d66d923d80.tar.gz ptxdist-e63ecc69e7ec211c830aea705aa429d66d923d80.tar.xz |
libseccomp: version bump 2.4.1 -> 2.4.3
Note: The new version is important for glibc 2.31:
Starting with this version, the clock_gettime() implementation calls the
clock_gettime64() syscall internaly.
The definition of this syscall was imported into libseccomp with the commit
"Update the syscall table for Linux v5.4-rc4" in version 2.4.2.
The current systemd version tries to whitelist clock_gettime64 but this is
ignored if libseccomp does not know about it.
As a result, with glibc 2.31 and libseccomp 2.4.1 clock_gettime64 is not
allowed for any systemd service that uses SystemCallFilter= with a
whitelist.
Specifically systemd-journald, systemd-udevd and others don't run properly
and the system fails to boot.
Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
-rw-r--r-- | patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch (renamed from patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch) | 0 | ||||
-rw-r--r-- | patches/libseccomp-2.4.3/series (renamed from patches/libseccomp-2.4.1/series) | 0 | ||||
-rw-r--r-- | rules/libseccomp.make | 4 |
3 files changed, 2 insertions, 2 deletions
diff --git a/patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch b/patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch index 9e4b6d350..9e4b6d350 100644 --- a/patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch +++ b/patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch diff --git a/patches/libseccomp-2.4.1/series b/patches/libseccomp-2.4.3/series index d492518bb..d492518bb 100644 --- a/patches/libseccomp-2.4.1/series +++ b/patches/libseccomp-2.4.3/series diff --git a/rules/libseccomp.make b/rules/libseccomp.make index fb04a4605..07734c82a 100644 --- a/rules/libseccomp.make +++ b/rules/libseccomp.make @@ -14,8 +14,8 @@ PACKAGES-$(PTXCONF_LIBSECCOMP) += libseccomp # # Paths and names # -LIBSECCOMP_VERSION := 2.4.1 -LIBSECCOMP_MD5 := 4fa6b0f39b48b8644415d7a9a9dfe9f4 +LIBSECCOMP_VERSION := 2.4.3 +LIBSECCOMP_MD5 := 1de97a3c04889a790d97722d08f4a8d1 LIBSECCOMP := libseccomp-$(LIBSECCOMP_VERSION) LIBSECCOMP_SUFFIX := tar.gz LIBSECCOMP_URL := https://github.com/seccomp/libseccomp/releases/download/v$(LIBSECCOMP_VERSION)/$(LIBSECCOMP).$(LIBSECCOMP_SUFFIX) |