Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libseccomp-devel-2.4.1-3.3.1 RPM for s390x

From OpenSuSE Leap 15.3 for s390x

Name: libseccomp-devel Distribution: SUSE Linux Enterprise 15
Version: 2.4.1 Vendor: SUSE LLC <https://www.suse.com/>
Release: 3.3.1 Build date: Fri Aug 30 16:57:05 2019
Group: Development/Libraries/C and C++ Build host: s390zp36
Size: 64656 Source RPM: libseccomp-2.4.1-3.3.1.src.rpm
Packager: https://www.suse.com/
Url: http://github.com/seccomp
Summary: Development files for libseccomp, an enhanced Seccomp (mode 2) helper library
The libseccomp library provides an interface to the Linux Kernel's
syscall filtering mechanism, seccomp. The libseccomp API abstracts
away the underlying BPF-based syscall filter language and presents a
more conventional function-call based filtering interface.

This package contains the development files for libseccomp.

Provides

Requires

License

LGPL-2.1-only

Changelog

* Wed Jul 24 2019 normand@linux.vnet.ibm.com
  - ignore make check error for ppc64/ppc64le, bypass boo#1142614
* Sun Jun 02 2019 jengelh@inai.de
  - Update to new upstream release 2.4.1
    * Fix a BPF generation bug where the optimizer mistakenly
      identified duplicate BPF code blocks.
* Sun Mar 17 2019 meissner@suse.com
  - updated to 2.4.0 (bsc#1128828 CVE-2019-9893)
    - Update the syscall table for Linux v5.0-rc5
    - Added support for the SCMP_ACT_KILL_PROCESS action
    - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
    - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
    - Added support for the parisc and parisc64 architectures
    - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
    - Return -EDOM on an endian mismatch when adding an architecture to a filter
    - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
    - Fix PFC generation when a syscall is prioritized, but no rule exists
    - Numerous fixes to the seccomp-bpf filter generation code
    - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
    - Numerous tests added to the included test suite, coverage now at ~92%
    - Update our Travis CI configuration to use Ubuntu 16.04
    - Numerous documentation fixes and updates
  - now gpg signed, added key of Paul Moore from keyserver.
* Mon Jan 14 2019 kukuk@suse.de
  - Use %license instead of %doc [bsc#1082318]
* Sat Feb 24 2018 asarai@suse.com
  - Update to release 2.3.3:
    * Updated the syscall table for Linux v4.15-rc7
* Sun May 21 2017 jengelh@inai.de
  - Unconditionally rerun autoreconf because of patches
* Sun May 21 2017 tchvatal@suse.com
  - Update to release 2.3.2:
    * Achieved full compliance with the CII Best Practices program
    * Added Travis CI builds to the GitHub repository
    * Added code coverage reporting with the "--enable-code-coverage" configure
      flag and added Coveralls to the GitHub repository
    * Updated the syscall tables to match Linux v4.10-rc6+
    * Support for building with Python v3.x
    * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
      set to true
    * Several small documentation fixes
  - Remove service file as we are not based on git
* Sat May 07 2016 jengelh@inai.de
  - Update to new upstream release 2.3.1
    * arch: fix the multiplexed ipc() syscalls
    * s390: handle multiplexed syscalls correctly
  - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch,
    0001-tests-replace-socket-syscall-references-in-15-basic-.patch
    (fixed upstream)
* Tue Apr 19 2016 jengelh@inai.de
  - Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch
* Sun Apr 10 2016 jengelh@inai.de
  - Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch
* Wed Mar 23 2016 meissner@suse.com
  - updated to final 2.3.0 release
  - builderror-k316.diff: fixed upstream
  - i586 testsuite fails, disable for now
* Wed Feb 24 2016 jengelh@inai.de
  - Update to git snapshot 2.3.0~g96
    * have libseccomp build with newer linux-glibc-devel;
    "multiplexed and direct socket syscalls"
  - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch
    (no longer apply - merged upstream)
  - Add builderror-k316.diff
* Fri Sep 25 2015 dimstar@opensuse.org
  - Add baselibs.conf: systemd-32bit-224+ links against
    libseccomp.so.2.
* Mon Aug 31 2015 jengelh@inai.de
  - Update to new upstream release 2.2.3
    * Fix a problem with the masked equality operator
    * Fix a problem on x86_64/x32 involving invalid architectures
    * Fix a problem with the ARM specific syscalls
* Sat May 30 2015 jengelh@inai.de
  - Update to new upstream release 2.2.1
    * Fix a problem with syscall argument filtering on 64-bit systems
    * Fix some problems with the 32-bit ARM syscall table
  - Drop 0001-tools-add-the-missing-elf.h-header-file.patch,
    libseccomp-arm-syscall-fixes.patch
    (applied upstream)
* Mon Apr 13 2015 dvaleev@suse.com
  - Fix ppc64le build: libseccomp-ppc64le.patch
* Fri Apr 10 2015 afaerber@suse.de
  - Fix some arm syscall constants
    libseccomp-arm-syscall-fixes.patch
* Sun Mar 29 2015 jengelh@inai.de
  - Update to new upstream release 2.2.0
    * Added support for aarch64, mips, mips64, mips64n32 (BE/LE).
    * Added support for using the new seccomp() syscall and the thread
    sync functionality.
    * Added Python bindings
  - Remove 0001-build-use-autotools-as-build-system.patch
    (merged). Add no-static.diff.
    Add 0001-tools-add-the-missing-elf.h-header-file.patch

Files

/usr/include/libseccomp
/usr/include/libseccomp/seccomp.h
/usr/lib64/libseccomp.so
/usr/lib64/pkgconfig/libseccomp.pc
/usr/share/man/man3/seccomp_api_get.3.gz
/usr/share/man/man3/seccomp_api_set.3.gz
/usr/share/man/man3/seccomp_arch_add.3.gz
/usr/share/man/man3/seccomp_arch_exist.3.gz
/usr/share/man/man3/seccomp_arch_native.3.gz
/usr/share/man/man3/seccomp_arch_remove.3.gz
/usr/share/man/man3/seccomp_arch_resolve_name.3.gz
/usr/share/man/man3/seccomp_attr_get.3.gz
/usr/share/man/man3/seccomp_attr_set.3.gz
/usr/share/man/man3/seccomp_export_bpf.3.gz
/usr/share/man/man3/seccomp_export_pfc.3.gz
/usr/share/man/man3/seccomp_init.3.gz
/usr/share/man/man3/seccomp_load.3.gz
/usr/share/man/man3/seccomp_merge.3.gz
/usr/share/man/man3/seccomp_release.3.gz
/usr/share/man/man3/seccomp_reset.3.gz
/usr/share/man/man3/seccomp_rule_add.3.gz
/usr/share/man/man3/seccomp_rule_add_array.3.gz
/usr/share/man/man3/seccomp_rule_add_exact.3.gz
/usr/share/man/man3/seccomp_rule_add_exact_array.3.gz
/usr/share/man/man3/seccomp_syscall_priority.3.gz
/usr/share/man/man3/seccomp_syscall_resolve_name.3.gz
/usr/share/man/man3/seccomp_syscall_resolve_name_arch.3.gz
/usr/share/man/man3/seccomp_syscall_resolve_name_rewrite.3.gz
/usr/share/man/man3/seccomp_syscall_resolve_num_arch.3.gz
/usr/share/man/man3/seccomp_version.3.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 14:06:45 2024