libseccomp 2.2.3-2ubuntu3 source package in Ubuntu

Changelog

libseccomp (2.2.3-2ubuntu3) xenial; urgency=low

  * debian/patches/add-x86-32bit-socket-calls.patch: add the newly
    connected direct socket calls.  (LP: #1526358)

 -- Andy Whitcroft <email address hidden>  Wed, 16 Dec 2015 14:30:17 +0000

Upload details

Uploaded by:
Andy Whitcroft
Uploaded to:
Xenial
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
libs
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
libseccomp_2.2.3.orig.tar.gz 510.5 KiB d9b400b703cab7bb04b84b9b6e52076a630b673819d7541757bcc16467b6d49e
libseccomp_2.2.3-2ubuntu3.debian.tar.xz 23.2 KiB 475e4dcbf65c170e7aac7dd43865267f3808e3dcf2df0e00c76b22af86bfdb8a
libseccomp_2.2.3-2ubuntu3.dsc 2.0 KiB c09e43b85b1900fc10dbd67b1f54d1215020be5d8a09d94a139c23fe4a6e12d9

Available diffs

View changes file

Binary packages built by this source

libseccomp-dev: high level interface to Linux seccomp filter (development files)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.
 .
 This package contains the development files.

libseccomp2: high level interface to Linux seccomp filter

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

libseccomp2-dbgsym: debug symbols for package libseccomp2

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

seccomp: helper tools for high level interface to Linux seccomp filter

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.

seccomp-dbgsym: debug symbols for package seccomp

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.