libseccomp 2.1.1-1ubuntu1~trusty3 source package in Ubuntu
Changelog
libseccomp (2.1.1-1ubuntu1~trusty3) trusty-proposed; urgency=medium * Cherrypick various bpf fixes to support argument filtering on 64-bit (LP: #1653487) - debian/patches/bpf-use-state-arch.patch: use state->arch instead of db->arch in _gen_bpf_arch() - debian/patches/db-require-filters-to-share-endianess.patch: require all filters in a collection to share the same endianess - debian/patches/resolve-issues-caused-by-be.patch: resolve issues caused by big endian systems - debian/patches/bpf-accumulator-check.patch: test the bpf accumulator checking logic - debian/patches/bpf-track-accumulator-state.patch: track accumulator state and reload it when necessary. This is the fix for LP: #1653487. The previous patches are required by this patch. - debian/patches/ensure-simulator-has-valid-arch.patch: ensure the simulator always has a valid architecture value. This fixes a regression in the testsuite introduced by resolve-issues-caused-by-be.patch - debian/patches/bpf-accumulator-check-indep.patch: fix a regression in the testsuite introduced by bpf-accumulator-check.patch - debian/patches/fix-audit-arch-i386.patch: fix arch token for 32-bit x86 not being defined correctly for the tools libseccomp (2.1.1-1ubuntu1~trusty1) trusty-proposed; urgency=medium * Bring libseccomp 2.1.1-1ubuntu1~vivid2, from Ubuntu 14.10, to Ubuntu 14.04 and add a couple patches to account for new syscalls found in the 4.4 based hardware enablement kernel. This allows for proper snap seccomp confinement on Ubuntu 14.04 when using the hardware enablement kernel (LP: #1450642) - debian/patches/add-membarrier-and-userfaultfd.patch: Add membarrier and userfaultfd syscalls - debian/patches/add-mlock2.patch: Add mlock2 syscall - debian/tests/data/all-except-s390-4.4.filter: Add autopkgtest that verifies all syscalls found in the 4.4 kernel, except for the s390 specific syscalls, are supported by libseccomp. The s390 specific syscalls are not needed since this version of libseccomp does not support the s390 architecture. - debian/tests/test-filter: Skip the getrandom filter tests since SYS_getrandom is not defined in 14.04 environment and the getrandom(2) syscall is not even available in the 14.04 release kernel. libseccomp (2.1.1-1ubuntu1~vivid2) vivid-proposed; urgency=medium * add-finit-module.patch: add finit_module syscalls to x86 and x86-64 syscall tables * update syscalls for modern kernels (skipping MIPS) - update syscalls for 3.16: + update-x86-syscall-table.patch + update-x86_64-syscall-table.patch + update-arm-syscall-table.patch + update-x32-syscall-table.patch + sync-syscall-table-entries.patch + sync-syscall-table-entries-fixtypo.patch - update syscalls for 3.17: + sync-syscall-table-entries-3.17.patch - update syscalls for 3.19: + sync-syscall-table-entries-3.19.patch - LP: #1450642 * fix-segfault-with-unknown.patch: fix segfault when find unknown syscall * debian/patches/add-missing-arm-private-syscalls.path: add missing private ARM syscalls * add autopkgtests for scmp_sys_resolver and filter testing and SYS_getrandom() testing libseccomp (2.1.1-1) unstable; urgency=low * New upstream release (Closes: 733293). * copyright: add a few missed people. * rules: adjusted for new test target. * libseccomp2.symbols: drop accidentally exported functions. * control: - bump standards, no changes needed. - add armel target -- Jamie Strandboge <email address hidden> Wed, 04 Jan 2017 21:11:30 +0000
Upload details
- Uploaded by:
- Jamie Strandboge
- Uploaded to:
- Trusty
- Original maintainer:
- Ubuntu Developers
- Architectures:
- i386 amd64 armhf armel
- Section:
- libs
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libseccomp_2.1.1.orig.tar.gz | 110.5 KiB | 8812c11e407c383f5ad6afb84a88e5a0224477bcfe8ff03f0c548e5abaac841c |
libseccomp_2.1.1-1ubuntu1~trusty3.debian.tar.gz | 33.5 KiB | 4775eeb38831f4ed4dc592d28e051832d6ffb68703e6d47891793f8c86868205 |
libseccomp_2.1.1-1ubuntu1~trusty3.dsc | 2.0 KiB | 90e1e35474d33507ad23b9581c5698636c763a1b1ecbc445b425060400fcb0da |
Available diffs
Binary packages built by this source
- libseccomp-dev: high level interface to Linux seccomp filter (development files)
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
.
This package contains the development files.
- libseccomp2: high level interface to Linux seccomp filter
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
- libseccomp2-dbgsym: debug symbols for package libseccomp2
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
- seccomp: helper tools for high level interface to Linux seccomp filter
Provides helper tools for interacting with libseccomp. Currently, only
a single tool exists, providing a way to easily enumerate syscalls across
the supported architectures.
- seccomp-dbgsym: debug symbols for package seccomp
Provides helper tools for interacting with libseccomp. Currently, only
a single tool exists, providing a way to easily enumerate syscalls across
the supported architectures.