summary refs log tree commit diff
path: root/gnu/packages/patches
diff options
context:
space:
mode:
authorTobias Geerinckx-Rice <me@tobias.gr>2020-03-09 04:23:45 +0100
committerTobias Geerinckx-Rice <me@tobias.gr>2020-03-09 16:01:18 +0100
commitc3bde0b7af30a7d228e74bee44ddc4c4b1f4532c (patch)
treef39ef1f76675f472b75273df8b5c547dd16634e8 /gnu/packages/patches
parent1fad0b8674cf97a7e102e98ab31fcebe07ae9515 (diff)
downloadguix-c3bde0b7af30a7d228e74bee44ddc4c4b1f4532c.tar.gz
gnu: libseccomp: Update to 2.4.3.
* gnu/packages/linux.scm (libseccomp): Update to 2.4.3.
[source]: Remove upstreamed patch.
* gnu/packages/patches/libseccomp-open-aarch64.patch: Delete file.
* gnu/local.mk (dist_patch_DATA): Remove it.
Diffstat (limited to 'gnu/packages/patches')
-rw-r--r--gnu/packages/patches/libseccomp-open-aarch64.patch27
1 files changed, 0 insertions, 27 deletions
diff --git a/gnu/packages/patches/libseccomp-open-aarch64.patch b/gnu/packages/patches/libseccomp-open-aarch64.patch
deleted file mode 100644
index 6e62825892..0000000000
--- a/gnu/packages/patches/libseccomp-open-aarch64.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-This patch fixes the build failure on AArch64 reported
-at <https://github.com/seccomp/libseccomp/pull/191>.
-
-From cc21c1b48d35f9d34ef2da0e184af3855bfeee5f Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl>
-Date: Wed, 20 Nov 2019 14:11:12 -0500
-Subject: [PATCH] tests: use openat instead of open
-
-On arm64, __NR_open is not defined, openat is always used. Let's use openat
-instead, which is defined for architectures currently.
----
- tests/15-basic-resolver.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/tests/15-basic-resolver.c b/tests/15-basic-resolver.c
-index 6badef1..4884faf 100644
---- a/tests/15-basic-resolver.c
-+++ b/tests/15-basic-resolver.c
-@@ -55,7 +55,7 @@ int main(int argc, char *argv[])
- 	unsigned int arch;
- 	char *name = NULL;
- 
--	if (seccomp_syscall_resolve_name("open") != __NR_open)
-+	if (seccomp_syscall_resolve_name("openat") != __NR_openat)
- 		goto fail;
- 	if (seccomp_syscall_resolve_name("read") != __NR_read)
- 		goto fail;