touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #100073
[Bug 1427076] Comment bridged from LTC Bugzilla
------- Comment From strosake@xxxxxxxxxx 2015-09-02 16:45 EDT-------
Here are the 4 libseccomp commit IDs:
arch: add a ppc syscall table
c1a168dfb53defb637754de9d6837b8fcf3b0213
arch: add basic initial ppc support to the arch-dependent code
a2ad734f9344406a898feb02462603bc4b0b3a81
tools: add ppc support
b6cdaa0e09a2fe3e47b4272597c208a33464c20f
tests: add ppc support to the regression tests
0843a460f72da50756432a021c387fe8a7ab0bd5
There is also a small fix relevant to the python bindings:
4367b1b4f94ca1e0c0606ff85622f2ecb1a9c278
python: ensure attributes are treated as 32 bits
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1427076
Title:
[Ubuntu 15.10] Add Power LE support to libseccomp
Status in libseccomp package in Ubuntu:
Triaged
Bug description:
== Comment: #0 - George C. Wilson <gcwilson@xxxxxxxxxx> - 2015-01-28
10:13:19 ==
seccomp mode 2 involves the parsing of BPF (Berkeley Packet Filter)
configuration files to define system call filtering. Mode 2 is not
currently supported on Power; this feature covers the addition of this
support, which likely includes updates to the kernel and to
libseccomp.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1427076/+subscriptions