Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libseccomp2-2.4.1-lp152.1.1 RPM for aarch64

From OpenSuSE Ports Leap 15.2 for aarch64

Name: libseccomp2 Distribution: openSUSE Leap 15.2
Version: 2.4.1 Vendor: openSUSE
Release: lp152.1.1 Build date: Mon Oct 14 12:31:38 2019
Group: System/Libraries Build host: obs-arm-8
Size: 354396 Source RPM: libseccomp-2.4.1-lp152.1.1.src.rpm
Summary: An enhanced Seccomp (mode 2) helper library
The libseccomp library provides an interface to the Linux Kernel's
syscall filtering mechanism, seccomp. The libseccomp API abstracts
away the underlying BPF-based syscall filter language and presents a
more conventional function-call based filtering interface.






* Wed Jul 24 2019 Michel Normand <>
  - ignore make check error for ppc64/ppc64le, bypass boo#1142614
* Sun Jun 02 2019 Jan Engelhardt <>
  - Update to new upstream release 2.4.1
    * Fix a BPF generation bug where the optimizer mistakenly
      identified duplicate BPF code blocks.
* Sun Mar 17 2019 Marcus Meissner <>
  - updated to 2.4.0 (bsc#1128828 CVE-2019-9893)
    - Update the syscall table for Linux v5.0-rc5
    - Added support for the SCMP_ACT_KILL_PROCESS action
    - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute
    - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension
    - Added support for the parisc and parisc64 architectures
    - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3)
    - Return -EDOM on an endian mismatch when adding an architecture to a filter
    - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run()
    - Fix PFC generation when a syscall is prioritized, but no rule exists
    - Numerous fixes to the seccomp-bpf filter generation code
    - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3
    - Numerous tests added to the included test suite, coverage now at ~92%
    - Update our Travis CI configuration to use Ubuntu 16.04
    - Numerous documentation fixes and updates
  - now gpg signed, added key of Paul Moore from keyserver.
* Mon Jan 14 2019
  - Use %license instead of %doc [bsc#1082318]
* Sat Feb 24 2018
  - Update to release 2.3.3:
    * Updated the syscall table for Linux v4.15-rc7
* Sun May 21 2017
  - Unconditionally rerun autoreconf because of patches
* Sun May 21 2017
  - Update to release 2.3.2:
    * Achieved full compliance with the CII Best Practices program
    * Added Travis CI builds to the GitHub repository
    * Added code coverage reporting with the "--enable-code-coverage" configure
      flag and added Coveralls to the GitHub repository
    * Updated the syscall tables to match Linux v4.10-rc6+
    * Support for building with Python v3.x
    * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is
      set to true
    * Several small documentation fixes
  - Remove service file as we are not based on git
* Sat May 07 2016
  - Update to new upstream release 2.3.1
    * arch: fix the multiplexed ipc() syscalls
    * s390: handle multiplexed syscalls correctly
  - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch,
    (fixed upstream)
* Tue Apr 19 2016
  - Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch
* Sun Apr 10 2016
  - Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch
* Wed Mar 23 2016
  - updated to final 2.3.0 release
  - builderror-k316.diff: fixed upstream
  - i586 testsuite fails, disable for now
* Wed Feb 24 2016
  - Update to git snapshot 2.3.0~g96
    * have libseccomp build with newer linux-glibc-devel;
    "multiplexed and direct socket syscalls"
  - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch
    (no longer apply - merged upstream)
  - Add builderror-k316.diff
* Fri Sep 25 2015
  - Add baselibs.conf: systemd-32bit-224+ links against
* Mon Aug 31 2015
  - Update to new upstream release 2.2.3
    * Fix a problem with the masked equality operator
    * Fix a problem on x86_64/x32 involving invalid architectures
    * Fix a problem with the ARM specific syscalls
* Sat May 30 2015
  - Update to new upstream release 2.2.1
    * Fix a problem with syscall argument filtering on 64-bit systems
    * Fix some problems with the 32-bit ARM syscall table
  - Drop 0001-tools-add-the-missing-elf.h-header-file.patch,
    (applied upstream)
* Mon Apr 13 2015
  - Fix ppc64le build: libseccomp-ppc64le.patch
* Fri Apr 10 2015
  - Fix some arm syscall constants
* Sun Mar 29 2015
  - Update to new upstream release 2.2.0
    * Added support for aarch64, mips, mips64, mips64n32 (BE/LE).
    * Added support for using the new seccomp() syscall and the thread
    sync functionality.
    * Added Python bindings
  - Remove 0001-build-use-autotools-as-build-system.patch
    (merged). Add no-static.diff.
    Add 0001-tools-add-the-missing-elf.h-header-file.patch



Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Jun 9 11:46:04 2024