Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libseccomp2-32bit | Distribution: openSUSE Tumbleweed |
Version: 2.5.4 | Vendor: openSUSE |
Release: 2.4 | Build date: Sun Mar 19 16:53:00 2023 |
Group: System/Libraries | Build host: lamb01 |
Size: 128475 | Source RPM: libseccomp-2.5.4-2.4.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/seccomp/libseccomp | |
Summary: An enhanced Seccomp (mode 2) helper library |
The libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API abstracts away the underlying BPF-based syscall filter language and presents a more conventional function-call based filtering interface.
LGPL-2.1-only
* Fri Jul 01 2022 Marcus Rueckert <mrueckert@suse.de> - fix build of python3 bindings so that the debug* package names do not overlay with the main package * Wed Jun 29 2022 Robert Frohl <rfrohl@suse.com> - Use multibuild to get python3 support back * Sat Apr 30 2022 Jan Engelhardt <jengelh@inai.de> - Deactive python3 by default, it's just not a good idea for ring0. * Thu Apr 21 2022 Jan Engelhardt <jengelh@inai.de> - Update to release 2.5.4 * Update the syscall table for Linux v5.17. * Fix minor issues with binary tree testing and with empty binary trees. * Minor documentation improvements including retiring the mailing list. * Mon Jan 17 2022 Marcus Meissner <meissner@suse.com> - buildrequire python-rpm-macros * Thu Dec 02 2021 Marcus Rueckert <mrueckert@suse.de> - reenable python bindings at least for the distro default python3 package: - adds make-python-build.patch * Sun Nov 07 2021 Jan Engelhardt <jengelh@inai.de> - Update to release 2.5.3 * Update the syscall table for Linux v5.15 * Fix issues with multiplexed syscalls on mipsel introduced in v2.5.2 * Document that seccomp_rule_add() may return -EACCES * Mon Sep 13 2021 Andreas Schwab <schwab@suse.de> - Skip 11-basic-basic_errors test on qemu linux-user emulation * Wed Sep 01 2021 Jan Engelhardt <jengelh@inai.de> - Update to release 2.5.2 * Update the syscall table for Linux v5.14-rc7 * Add a function, get_notify_fd(), to the Python bindings to get the nofication file descriptor. * Consolidate multiplexed syscall handling for all architectures into one location. * Add multiplexed syscall support to PPC and MIPS * The meaning of SECCOMP_IOCTL_NOTIF_ID_VALID changed within the kernel. libseccomp's fd notification logic was modified to support the kernel's previous and new usage of SECCOMP_IOCTL_NOTIF_ID_VALID. * Sat Nov 21 2020 Dirk Mueller <dmueller@suse.com> - update to 2.5.1: * Fix a bug where seccomp_load() could only be called once * Change the notification fd handling to only request a notification fd if * the filter has a _NOTIFY action * Add documentation about SCMP_ACT_NOTIFY to the seccomp_add_rule(3) manpage * Clarify the maintainers' GPG keys - remove testsuite-riscv64-missing-syscalls.patch * Wed Sep 09 2020 Dominique Leuenberger <dimstar@opensuse.org> - Do not rely on gperf: pass GPERF=/bin/true to configure and remove gperf BuildRequires. The syscalls.perf file it would generate is part of the tarball already. * Tue Sep 08 2020 Andreas Schwab <schwab@suse.de> - testsuite-riscv64-missing-syscalls.patch: Fix testsuite failure on riscv64 - Ignore failure of tests/52-basic-load on qemu linux-user emulation * Tue Sep 08 2020 Ralf Haferkamp <rhafer@suse.com> - Update to release 2.5.0 * Add support for the seccomp user notifications, see the seccomp_notify_alloc(3), seccomp_notify_receive(3), seccomp_notify_respond(3) manpages for more information * Add support for new filter optimization approaches, including a balanced tree optimization, see the SCMP_FLTATR_CTL_OPTIMIZE filter attribute for more information * Add support for the 64-bit RISC-V architecture * Performance improvements when adding new rules to a filter thanks to the use of internal shadow transactions and improved syscall lookup tables * Properly document the libseccomp API return values and include them in the stable API promise * Improvements to the s390 and s390x multiplexed syscall handling * Multiple fixes and improvements to the libseccomp manpages * Moved from manually maintained syscall tables to an automatically generated syscall table in CSV format * Update the syscall tables to Linux v5.8.0-rc5 * Python bindings and build now default to Python 3.x * Improvements to the tests have boosted code coverage to over 93% - libseccomp.keyring: replaced by Paul Moore <pmoore@redhat.com> key. * Fri Jun 05 2020 Jan Engelhardt <jengelh@inai.de> - Update to release 2.4.3 * Add list of authorized release signatures to README.md * Fix multiplexing issue with s390/s390x shm* syscalls * Remove the static flag from libseccomp tools compilation * Add define for __SNR_ppoll * Fix potential memory leak identified by clang in the scmp_bpf_sim tool - Drop no-static.diff, libseccomp-fix_aarch64-test.patch, SNR_ppoll.patch (merged) * Mon Feb 17 2020 Tomáš Chvátal <tchvatal@suse.com> - Add patch to fix ntpsec and others build (accidental drop of symbols): * SNR_ppoll.patch * Tue Jan 07 2020 Andreas Schwab <schwab@suse.de> - Tests are passing on all architectures * Mon Jan 06 2020 Guillaume GARDET <guillaume.gardet@opensuse.org> - Backport patch to fix test on aarch64: * libseccomp-fix_aarch64-test.patch * Thu Dec 19 2019 Jan Engelhardt <jengelh@inai.de> - Update to release 2.4.2 * Add support for io-uring related system calls * Wed Jul 24 2019 Michel Normand <normand@linux.vnet.ibm.com> - ignore make check error for ppc64/ppc64le, bypass boo#1142614 * Sun Jun 02 2019 Jan Engelhardt <jengelh@inai.de> - Update to new upstream release 2.4.1 * Fix a BPF generation bug where the optimizer mistakenly identified duplicate BPF code blocks. * Sun Mar 17 2019 Marcus Meissner <meissner@suse.com> - updated to 2.4.0 (bsc#1128828 CVE-2019-9893) - Update the syscall table for Linux v5.0-rc5 - Added support for the SCMP_ACT_KILL_PROCESS action - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension - Added support for the parisc and parisc64 architectures - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3) - Return -EDOM on an endian mismatch when adding an architecture to a filter - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run() - Fix PFC generation when a syscall is prioritized, but no rule exists - Numerous fixes to the seccomp-bpf filter generation code - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3 - Numerous tests added to the included test suite, coverage now at ~92% - Update our Travis CI configuration to use Ubuntu 16.04 - Numerous documentation fixes and updates - now gpg signed, added key of Paul Moore from keyserver. * Mon Jan 14 2019 kukuk@suse.de - Use %license instead of %doc [bsc#1082318]
/usr/lib/libseccomp.so.2 /usr/lib/libseccomp.so.2.5.4
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Jun 1 23:32:06 2023