SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for libseccomp2-2.5.4-1.76.x86_64.rpm :

* Fri Jul 01 2022 Marcus Rueckert - fix build of python3 bindings so that the debug
* package names do not overlay with the main package
* Wed Jun 29 2022 Robert Frohl - Use multibuild to get python3 support back
* Sat Apr 30 2022 Jan Engelhardt - Deactive python3 by default, it\'s just not a good idea for ring0.
* Thu Apr 21 2022 Jan Engelhardt - Update to release 2.5.4
* Update the syscall table for Linux v5.17.
* Fix minor issues with binary tree testing and with empty binary trees.
* Minor documentation improvements including retiring the mailing list.
* Mon Jan 17 2022 Marcus Meissner - buildrequire python-rpm-macros
* Thu Dec 02 2021 Marcus Rueckert - reenable python bindings at least for the distro default python3 package: - adds make-python-build.patch
* Sun Nov 07 2021 Jan Engelhardt - Update to release 2.5.3
* Update the syscall table for Linux v5.15
* Fix issues with multiplexed syscalls on mipsel introduced in v2.5.2
* Document that seccomp_rule_add() may return -EACCES
* Mon Sep 13 2021 Andreas Schwab - Skip 11-basic-basic_errors test on qemu linux-user emulation
* Wed Sep 01 2021 Jan Engelhardt - Update to release 2.5.2
* Update the syscall table for Linux v5.14-rc7
* Add a function, get_notify_fd(), to the Python bindings to get the nofication file descriptor.
* Consolidate multiplexed syscall handling for all architectures into one location.
* Add multiplexed syscall support to PPC and MIPS
* The meaning of SECCOMP_IOCTL_NOTIF_ID_VALID changed within the kernel. libseccomp\'s fd notification logic was modified to support the kernel\'s previous and new usage of SECCOMP_IOCTL_NOTIF_ID_VALID.
* Sat Nov 21 2020 Dirk Mueller - update to 2.5.1:
* Fix a bug where seccomp_load() could only be called once
* Change the notification fd handling to only request a notification fd if
* the filter has a _NOTIFY action
* Add documentation about SCMP_ACT_NOTIFY to the seccomp_add_rule(3) manpage
* Clarify the maintainers\' GPG keys- remove testsuite-riscv64-missing-syscalls.patch
* Wed Sep 09 2020 Dominique Leuenberger - Do not rely on gperf: pass GPERF=/bin/true to configure and remove gperf BuildRequires. The syscalls.perf file it would generate is part of the tarball already.
* Tue Sep 08 2020 Andreas Schwab - testsuite-riscv64-missing-syscalls.patch: Fix testsuite failure on riscv64- Ignore failure of tests/52-basic-load on qemu linux-user emulation
* Tue Sep 08 2020 Ralf Haferkamp - Update to release 2.5.0
* Add support for the seccomp user notifications, see the seccomp_notify_alloc(3), seccomp_notify_receive(3), seccomp_notify_respond(3) manpages for more information
* Add support for new filter optimization approaches, including a balanced tree optimization, see the SCMP_FLTATR_CTL_OPTIMIZE filter attribute for more information
* Add support for the 64-bit RISC-V architecture
* Performance improvements when adding new rules to a filter thanks to the use of internal shadow transactions and improved syscall lookup tables
* Properly document the libseccomp API return values and include them in the stable API promise
* Improvements to the s390 and s390x multiplexed syscall handling
* Multiple fixes and improvements to the libseccomp manpages
* Moved from manually maintained syscall tables to an automatically generated syscall table in CSV format
* Update the syscall tables to Linux v5.8.0-rc5
* Python bindings and build now default to Python 3.x
* Improvements to the tests have boosted code coverage to over 93%- libseccomp.keyring: replaced by Paul Moore key.
* Fri Jun 05 2020 Jan Engelhardt - Update to release 2.4.3
* Add list of authorized release signatures to README.md
* Fix multiplexing issue with s390/s390x shm
* syscalls
* Remove the static flag from libseccomp tools compilation
* Add define for __SNR_ppoll
* Fix potential memory leak identified by clang in the scmp_bpf_sim tool- Drop no-static.diff, libseccomp-fix_aarch64-test.patch, SNR_ppoll.patch (merged)
* Mon Feb 17 2020 Tomáš Chvátal - Add patch to fix ntpsec and others build (accidental drop of symbols):
* SNR_ppoll.patch
* Tue Jan 07 2020 Andreas Schwab - Tests are passing on all architectures
* Mon Jan 06 2020 Guillaume GARDET - Backport patch to fix test on aarch64:
* libseccomp-fix_aarch64-test.patch
 
ICM