Skip to content
Snippets Groups Projects
  1. Apr 09, 2012
    • Paul Moore's avatar
      all: relicense the library from GPLv2 to LGPLv2.1 · 160e7c15
      Paul Moore authored
      From the libseccomp-discuss mailing list:
      
        On Monday, April 09, 2012 06:06:51 PM Paul Moore wrote:
        > Hello,
        >
        > It was suggested on the libseccomp announcement thread that we
        > relicense the library from GPLv2 to LGPLv2.1.  In my opinion this
        > makes sense and I recommend we relicense the library, can I have
        > your permission to relicense your contributions?
        >
        >  * LGPLv2.1
        >    -> http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
      
      
      
        On Tuesday, April 10, 2012 10:07:37 AM Eric Paris wrote:
        > You have my permission to relicense to LGPL.
      
        On Tuesday, April 10, 2012 10:27:39 AM Ashley Lai wrote:
        > Yes, you have my permission to relicense to LGPL.
      
        On Tuesday, April 10, 2012 11:48:14 AM Corey Bryant wrote:
        > We (IBM) have OSSC approval now.  You have my approval to
        > relicense my contributions to LGPLv2.1.
      
        On Tuesday, April 10, 2012 12:57:25 PM Eduardo Otubo wrote:
        > On Tue, Apr 10, 2012 at 11:48:14AM -0400, Corey Bryant wrote:
        > > We (IBM) have OSSC approval now.  You have my approval to
        > > relicense my contributions to LGPLv2.1.
        >
        > Exactly, not a problem for me.
      
      Signed-off-by: default avatarPaul Moore <pmoore@redhat.com>
      160e7c15
  2. Jan 30, 2012
    • Paul Moore's avatar
      libseccomp: initial import of project · 054b6382
      Paul Moore authored
      
      This patch is the initial import of the libseccomp library, a library
      intended for use by application developers who wish to leverage the
      enhanced seccomp (mode 2) support in the Linux Kernel but who do not
      want to craft their own seccomp filter code by hand.  This library will
      provide a high-level API for developers which will allow them to
      generate and load seccomp filter code into the kernel by specifying
      which syscalls, optionally with argument values, are to be allowed or
      denied by the kernel.
      
      Needless to say, this is an initial import into the git repository so
      everything is still subject to change, and the usual caveats about
      untested code apply quite strongly.
      
      This code is licensed under the GPLv2, with some portions taken from
      examples provided by Will Drewry <wad@chromium.org> and copyrighted
      by the Chromium OS Authors <chromium-os-dev@chromium.org> which carries
      the following license (included in the associated files as well):
      
       "The code may be used by anyone for any purpose, and can serve as a
        starting point for developing applications using
        prctl(PR_ATTACH_SECCOMP_FILTER).
        No guarantees are provided with respect to the correctness or
        functionality of this code."
      
      Signed-off-by: default avatarPaul Moore <pmoore@redhat.com>
      054b6382
Loading