libseccomp 2.4.3-1ubuntu2 source package in Ubuntu

Changelog

libseccomp (2.4.3-1ubuntu2) groovy; urgency=medium

  * Add missing syscalls for aarch64 (LP: #1877633)
    - fix-aarch64-syscalls.patch: Backport of pending PR #235 from
      upstream

 -- Alex Murray <email address hidden>  Tue, 12 May 2020 13:21:14 +0930

Upload details

Uploaded by:
Alex Murray
Sponsored by:
Jamie Strandboge
Uploaded to:
Groovy
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libseccomp_2.4.3.orig.tar.gz 584.1 KiB cf15d1421997fac45b936515af61d209c4fd788af11005d212b3d0fd71e7991d
libseccomp_2.4.3-1ubuntu2.debian.tar.xz 18.8 KiB 185fa90be217578e103735888f683de75c363f1d5df6696ca6d81faef7d517dc
libseccomp_2.4.3-1ubuntu2.dsc 2.5 KiB e94c1f41566a0d3a9d1a7207dae8546926d84fe89679d6e3c2e850c31f69987c

Available diffs

View changes file

Binary packages built by this source

libseccomp-dev: high level interface to Linux seccomp filter (development files)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.
 .
 This package contains the development files.

libseccomp2: high level interface to Linux seccomp filter

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

libseccomp2-dbgsym: debug symbols for libseccomp2
python3-seccomp: high level interface to Linux seccomp filter (Python 3 bindings)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

python3-seccomp-dbgsym: debug symbols for python3-seccomp
seccomp: helper tools for high level interface to Linux seccomp filter

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.

seccomp-dbgsym: debug symbols for seccomp