Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libseccomp-devel | Distribution: SUSE Linux Enterprise 15 |
Version: 2.4.1 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 3.3.1 | Build date: Fri Aug 30 16:57:05 2019 |
Group: Development/Libraries/C and C++ | Build host: s390zp36 |
Size: 64656 | Source RPM: libseccomp-2.4.1-3.3.1.src.rpm |
Packager: https://www.suse.com/ | |
Url: http://github.com/seccomp | |
Summary: Development files for libseccomp, an enhanced Seccomp (mode 2) helper library |
The libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API abstracts away the underlying BPF-based syscall filter language and presents a more conventional function-call based filtering interface. This package contains the development files for libseccomp.
LGPL-2.1-only
* Wed Jul 24 2019 normand@linux.vnet.ibm.com - ignore make check error for ppc64/ppc64le, bypass boo#1142614 * Sun Jun 02 2019 jengelh@inai.de - Update to new upstream release 2.4.1 * Fix a BPF generation bug where the optimizer mistakenly identified duplicate BPF code blocks. * Sun Mar 17 2019 meissner@suse.com - updated to 2.4.0 (bsc#1128828 CVE-2019-9893) - Update the syscall table for Linux v5.0-rc5 - Added support for the SCMP_ACT_KILL_PROCESS action - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension - Added support for the parisc and parisc64 architectures - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3) - Return -EDOM on an endian mismatch when adding an architecture to a filter - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run() - Fix PFC generation when a syscall is prioritized, but no rule exists - Numerous fixes to the seccomp-bpf filter generation code - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3 - Numerous tests added to the included test suite, coverage now at ~92% - Update our Travis CI configuration to use Ubuntu 16.04 - Numerous documentation fixes and updates - now gpg signed, added key of Paul Moore from keyserver. * Mon Jan 14 2019 kukuk@suse.de - Use %license instead of %doc [bsc#1082318] * Sat Feb 24 2018 asarai@suse.com - Update to release 2.3.3: * Updated the syscall table for Linux v4.15-rc7 * Sun May 21 2017 jengelh@inai.de - Unconditionally rerun autoreconf because of patches * Sun May 21 2017 tchvatal@suse.com - Update to release 2.3.2: * Achieved full compliance with the CII Best Practices program * Added Travis CI builds to the GitHub repository * Added code coverage reporting with the "--enable-code-coverage" configure flag and added Coveralls to the GitHub repository * Updated the syscall tables to match Linux v4.10-rc6+ * Support for building with Python v3.x * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is set to true * Several small documentation fixes - Remove service file as we are not based on git * Sat May 07 2016 jengelh@inai.de - Update to new upstream release 2.3.1 * arch: fix the multiplexed ipc() syscalls * s390: handle multiplexed syscalls correctly - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch, 0001-tests-replace-socket-syscall-references-in-15-basic-.patch (fixed upstream) * Tue Apr 19 2016 jengelh@inai.de - Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch * Sun Apr 10 2016 jengelh@inai.de - Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch * Wed Mar 23 2016 meissner@suse.com - updated to final 2.3.0 release - builderror-k316.diff: fixed upstream - i586 testsuite fails, disable for now * Wed Feb 24 2016 jengelh@inai.de - Update to git snapshot 2.3.0~g96 * have libseccomp build with newer linux-glibc-devel; "multiplexed and direct socket syscalls" - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch (no longer apply - merged upstream) - Add builderror-k316.diff * Fri Sep 25 2015 dimstar@opensuse.org - Add baselibs.conf: systemd-32bit-224+ links against libseccomp.so.2. * Mon Aug 31 2015 jengelh@inai.de - Update to new upstream release 2.2.3 * Fix a problem with the masked equality operator * Fix a problem on x86_64/x32 involving invalid architectures * Fix a problem with the ARM specific syscalls * Sat May 30 2015 jengelh@inai.de - Update to new upstream release 2.2.1 * Fix a problem with syscall argument filtering on 64-bit systems * Fix some problems with the 32-bit ARM syscall table - Drop 0001-tools-add-the-missing-elf.h-header-file.patch, libseccomp-arm-syscall-fixes.patch (applied upstream) * Mon Apr 13 2015 dvaleev@suse.com - Fix ppc64le build: libseccomp-ppc64le.patch * Fri Apr 10 2015 afaerber@suse.de - Fix some arm syscall constants libseccomp-arm-syscall-fixes.patch * Sun Mar 29 2015 jengelh@inai.de - Update to new upstream release 2.2.0 * Added support for aarch64, mips, mips64, mips64n32 (BE/LE). * Added support for using the new seccomp() syscall and the thread sync functionality. * Added Python bindings - Remove 0001-build-use-autotools-as-build-system.patch (merged). Add no-static.diff. Add 0001-tools-add-the-missing-elf.h-header-file.patch
/usr/include/libseccomp /usr/include/libseccomp/seccomp.h /usr/lib64/libseccomp.so /usr/lib64/pkgconfig/libseccomp.pc /usr/share/man/man3/seccomp_api_get.3.gz /usr/share/man/man3/seccomp_api_set.3.gz /usr/share/man/man3/seccomp_arch_add.3.gz /usr/share/man/man3/seccomp_arch_exist.3.gz /usr/share/man/man3/seccomp_arch_native.3.gz /usr/share/man/man3/seccomp_arch_remove.3.gz /usr/share/man/man3/seccomp_arch_resolve_name.3.gz /usr/share/man/man3/seccomp_attr_get.3.gz /usr/share/man/man3/seccomp_attr_set.3.gz /usr/share/man/man3/seccomp_export_bpf.3.gz /usr/share/man/man3/seccomp_export_pfc.3.gz /usr/share/man/man3/seccomp_init.3.gz /usr/share/man/man3/seccomp_load.3.gz /usr/share/man/man3/seccomp_merge.3.gz /usr/share/man/man3/seccomp_release.3.gz /usr/share/man/man3/seccomp_reset.3.gz /usr/share/man/man3/seccomp_rule_add.3.gz /usr/share/man/man3/seccomp_rule_add_array.3.gz /usr/share/man/man3/seccomp_rule_add_exact.3.gz /usr/share/man/man3/seccomp_rule_add_exact_array.3.gz /usr/share/man/man3/seccomp_syscall_priority.3.gz /usr/share/man/man3/seccomp_syscall_resolve_name.3.gz /usr/share/man/man3/seccomp_syscall_resolve_name_arch.3.gz /usr/share/man/man3/seccomp_syscall_resolve_name_rewrite.3.gz /usr/share/man/man3/seccomp_syscall_resolve_num_arch.3.gz /usr/share/man/man3/seccomp_version.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 14:06:45 2024