libseccomp 2.4.3-0ubuntu2 source package in Ubuntu
Changelog
libseccomp (2.4.3-0ubuntu2) focal; urgency=medium * Include clock_gettime64 in the autopkgtests in addition to clock_gettime, required on armhf. -- Steve Langasek <email address hidden> Thu, 12 Mar 2020 00:22:37 -0700
Upload details
- Uploaded by:
- Steve Langasek
- Uploaded to:
- Focal
- Original maintainer:
- Ubuntu Developers
- Architectures:
- linux-any
- Section:
- libs
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libseccomp_2.4.3.orig.tar.gz | 584.1 KiB | cf15d1421997fac45b936515af61d209c4fd788af11005d212b3d0fd71e7991d |
libseccomp_2.4.3-0ubuntu2.debian.tar.xz | 12.5 KiB | 46140a35b7272ee3863cd2e50676aff51d8d82b1b27c188ccf341e923f2c2bcb |
libseccomp_2.4.3-0ubuntu2.dsc | 2.5 KiB | b5ff48695ad2a1450e701863708c5eada28f46d2ccb8e55107d9b1e9f1906250 |
Available diffs
- diff from 2.4.3-0ubuntu1 to 2.4.3-0ubuntu2 (570 bytes)
Binary packages built by this source
- libseccomp-dev: high level interface to Linux seccomp filter (development files)
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
.
This package contains the development files.
- libseccomp2: high level interface to Linux seccomp filter
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
- libseccomp2-dbgsym: debug symbols for libseccomp2
- python3-seccomp: high level interface to Linux seccomp filter (Python 3 bindings)
This library provides a high level interface to constructing, analyzing
and installing seccomp filters via a BPF passed to the Linux Kernel's
prctl() syscall.
- python3-seccomp-dbgsym: debug symbols for python3-seccomp
- seccomp: helper tools for high level interface to Linux seccomp filter
Provides helper tools for interacting with libseccomp. Currently, only
a single tool exists, providing a way to easily enumerate syscalls across
the supported architectures.
- seccomp-dbgsym: debug symbols for seccomp