Libev is modelled (very losely) after libevent and the Event perl module, but is faster, scales better and is more correct, more featureful, and smaller. Some of the specialties of libev not commonly found elsewhere are: - extensive and detailed, readable documentation (not doxygen garbage). - fully supports fork, can detect fork in various ways and automatically re-arms kernel mechanisms that do not support fork. - highly optimised select, poll, epoll, kqueue and event ports backends. - filesystem object (path) watching (with optional linux inotify support). - wallclock-based times (using absolute time, cron-like). - relative timers/timeouts (handle time jumps). - fast intra-thread communication between multiple event loops (with optional fast linux eventfd backend). - extremely easy to embed. - very small codebase, no bloated library. - fully extensible by being able to plug into the event loop, integrate other event loops, integrate other event loop users. - very little memory use (small watchers, small event loop data). - optional C++ interface allowing method and function callbacks at no extra memory or runtime overhead. - optional Perl interface with similar characteristics - support for other languages (multiple C++ interfaces, D, Ruby, Python) available from third-parties.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | libev-4.33.tgz |
NetBSD 10.0 | aarch64 | libev-4.33.tgz |
NetBSD 10.0 | aarch64eb | libev-4.33.tgz |
NetBSD 10.0 | aarch64eb | libev-4.33.tgz |
NetBSD 10.0 | alpha | libev-4.33.tgz |
NetBSD 10.0 | alpha | libev-4.33.tgz |
NetBSD 10.0 | earmv4 | libev-4.33.tgz |
NetBSD 10.0 | earmv4 | libev-4.33.tgz |
NetBSD 10.0 | earmv6hf | libev-4.33.tgz |
NetBSD 10.0 | earmv6hf | libev-4.33.tgz |
NetBSD 10.0 | earmv6hf | libev-4.33.tgz |
NetBSD 10.0 | earmv7hf | libev-4.33.tgz |
NetBSD 10.0 | earmv7hf | libev-4.33.tgz |
NetBSD 10.0 | earmv7hf | libev-4.33.tgz |
NetBSD 10.0 | i386 | libev-4.33.tgz |
NetBSD 10.0 | i386 | libev-4.33.tgz |
NetBSD 10.0 | m68k | libev-4.33.tgz |
NetBSD 10.0 | m68k | libev-4.33.tgz |
NetBSD 10.0 | m68k | libev-4.33.tgz |
NetBSD 10.0 | m68k | libev-4.33.tgz |
NetBSD 10.0 | mips64eb | libev-4.33.tgz |
NetBSD 10.0 | mips64eb | libev-4.33.tgz |
NetBSD 10.0 | powerpc | libev-4.33.tgz |
NetBSD 10.0 | powerpc | libev-4.33.tgz |
NetBSD 10.0 | powerpc | libev-4.33.tgz |
NetBSD 10.0 | sh3el | libev-4.33.tgz |
NetBSD 10.0 | sh3el | libev-4.33.tgz |
NetBSD 10.0 | sparc64 | libev-4.33.tgz |
NetBSD 10.0 | sparc64 | libev-4.33.tgz |
NetBSD 10.0 | sparc | libev-4.33.tgz |
NetBSD 10.0 | sparc | libev-4.33.tgz |
NetBSD 10.0 | vax | libev-4.33.tgz |
NetBSD 10.0 | vax | libev-4.33.tgz |
NetBSD 10.0 | vax | libev-4.33.tgz |
NetBSD 10.0 | x86_64 | libev-4.33.tgz |
NetBSD 10.0 | x86_64 | libev-4.33.tgz |
NetBSD 9.0 | aarch64 | libev-4.33.tgz |
NetBSD 9.0 | aarch64 | libev-4.33.tgz |
NetBSD 9.0 | alpha | libev-4.33.tgz |
NetBSD 9.0 | alpha | libev-4.33.tgz |
NetBSD 9.0 | earmv4 | libev-4.33.tgz |
NetBSD 9.0 | earmv4 | libev-4.33.tgz |
NetBSD 9.0 | earmv6hf | libev-4.33.tgz |
NetBSD 9.0 | earmv6hf | libev-4.33.tgz |
NetBSD 9.0 | earmv6hf | libev-4.33.tgz |
NetBSD 9.0 | earmv7hf | libev-4.33.tgz |
NetBSD 9.0 | earmv7hf | libev-4.33.tgz |
NetBSD 9.0 | earmv7hf | libev-4.33.tgz |
NetBSD 9.0 | i386 | libev-4.33.tgz |
NetBSD 9.0 | i386 | libev-4.33.tgz |
NetBSD 9.0 | m68k | libev-4.33.tgz |
NetBSD 9.0 | m68k | libev-4.33.tgz |
NetBSD 9.0 | m68k | libev-4.33.tgz |
NetBSD 9.0 | m68k | libev-4.33.tgz |
NetBSD 9.0 | powerpc | libev-4.33.tgz |
NetBSD 9.0 | powerpc | libev-4.33.tgz |
NetBSD 9.0 | powerpc | libev-4.33.tgz |
NetBSD 9.0 | sparc64 | libev-4.33.tgz |
NetBSD 9.0 | sparc64 | libev-4.33.tgz |
NetBSD 9.0 | x86_64 | libev-4.33.tgz |
NetBSD 9.0 | x86_64 | libev-4.33.tgz |
NetBSD 9.3 | x86_64 | libev-4.33.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.