summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMichael Olbrich <m.olbrich@pengutronix.de>2020-05-06 08:34:41 +0200
committerMichael Olbrich <m.olbrich@pengutronix.de>2020-05-08 09:05:18 +0200
commite63ecc69e7ec211c830aea705aa429d66d923d80 (patch)
tree8b80d3c793a4fa10c52282a2ebe7946086c4209d
parentd69cec0aadfa65148ae07220bedd4b4d7191f9dc (diff)
downloadptxdist-e63ecc69e7ec211c830aea705aa429d66d923d80.tar.gz
ptxdist-e63ecc69e7ec211c830aea705aa429d66d923d80.tar.xz
libseccomp: version bump 2.4.1 -> 2.4.3
Note: The new version is important for glibc 2.31: Starting with this version, the clock_gettime() implementation calls the clock_gettime64() syscall internaly. The definition of this syscall was imported into libseccomp with the commit "Update the syscall table for Linux v5.4-rc4" in version 2.4.2. The current systemd version tries to whitelist clock_gettime64 but this is ignored if libseccomp does not know about it. As a result, with glibc 2.31 and libseccomp 2.4.1 clock_gettime64 is not allowed for any systemd service that uses SystemCallFilter= with a whitelist. Specifically systemd-journald, systemd-udevd and others don't run properly and the system fails to boot. Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
-rw-r--r--patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch (renamed from patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch)0
-rw-r--r--patches/libseccomp-2.4.3/series (renamed from patches/libseccomp-2.4.1/series)0
-rw-r--r--rules/libseccomp.make4
3 files changed, 2 insertions, 2 deletions
diff --git a/patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch b/patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch
index 9e4b6d350..9e4b6d350 100644
--- a/patches/libseccomp-2.4.1/0001-run-time-use-a-broadly-supported-shell-interpreter.patch
+++ b/patches/libseccomp-2.4.3/0001-run-time-use-a-broadly-supported-shell-interpreter.patch
diff --git a/patches/libseccomp-2.4.1/series b/patches/libseccomp-2.4.3/series
index d492518bb..d492518bb 100644
--- a/patches/libseccomp-2.4.1/series
+++ b/patches/libseccomp-2.4.3/series
diff --git a/rules/libseccomp.make b/rules/libseccomp.make
index fb04a4605..07734c82a 100644
--- a/rules/libseccomp.make
+++ b/rules/libseccomp.make
@@ -14,8 +14,8 @@ PACKAGES-$(PTXCONF_LIBSECCOMP) += libseccomp
#
# Paths and names
#
-LIBSECCOMP_VERSION := 2.4.1
-LIBSECCOMP_MD5 := 4fa6b0f39b48b8644415d7a9a9dfe9f4
+LIBSECCOMP_VERSION := 2.4.3
+LIBSECCOMP_MD5 := 1de97a3c04889a790d97722d08f4a8d1
LIBSECCOMP := libseccomp-$(LIBSECCOMP_VERSION)
LIBSECCOMP_SUFFIX := tar.gz
LIBSECCOMP_URL := https://github.com/seccomp/libseccomp/releases/download/v$(LIBSECCOMP_VERSION)/$(LIBSECCOMP).$(LIBSECCOMP_SUFFIX)