libseccomp2-2.5.3-150300.10.8.1<>,Db&6p9|KCIp8d)q: y(#%TɓOu@ `.#D ?V[Y6*1^\" *6ofy8bdy#au#> !i[t%=mމ9g7OZW"sء>3bƽn~g)ܗU|]5t/n`p RnSн  ZRԚnxO0Od[3Bd=a }FڰtɪQʷ./6gW= Q?>@(?(d " NTXdh   $ , <  8H  t (8!9 !:`!>$@$F$G%H%I%(X%,Y%8\%d]%t^%b%c&d'e'!f'$l'&u'8v'Hw'x(y(z( (0(4(:(|Clibseccomp22.5.3150300.10.8.1An enhanced Seccomp (mode 2) helper libraryThe libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API abstracts away the underlying BPF-based syscall filter language and presents a more conventional function-call based filtering interface.b&6s390zl33h\SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/System/Librarieshttps://github.com/seccomp/libseccomplinuxs390x_lA큤b&4[b&4[b&6a4b8ed27c556ec9269fdab1abe44d497a610772245569a702c424599afdb84ce9102900208eef27b766380135906d431dba87edaa7ec6aa72e6ebd3dd67f3a97blibseccomp.so.2.5.3rootrootrootrootrootrootrootrootlibseccomp-2.5.3-150300.10.8.1.src.rpmlibseccomp.so.2()(64bit)libseccomp2libseccomp2(s390-64)@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.4)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3b%aZ@a@aa?=@a/k@_@_X_Wr@_Wr@^3^J@^r^!@]f@]8H@\@\6\ key.- Update to release 2.4.3 * Add list of authorized release signatures to README.md * Fix multiplexing issue with s390/s390x shm* syscalls * Remove the static flag from libseccomp tools compilation * Add define for __SNR_ppoll * Fix potential memory leak identified by clang in the scmp_bpf_sim tool - Drop no-static.diff, libseccomp-fix_aarch64-test.patch, SNR_ppoll.patch (merged)- Add patch to fix ntpsec and others build (accidental drop of symbols): * SNR_ppoll.patch- Tests are passing on all architectures- Backport patch to fix test on aarch64: * libseccomp-fix_aarch64-test.patch- Update to release 2.4.2 * Add support for io-uring related system calls- ignore make check error for ppc64/ppc64le, bypass boo#1142614- Update to new upstream release 2.4.1 * Fix a BPF generation bug where the optimizer mistakenly identified duplicate BPF code blocks.- updated to 2.4.0 (bsc#1128828 CVE-2019-9893) - Update the syscall table for Linux v5.0-rc5 - Added support for the SCMP_ACT_KILL_PROCESS action - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension - Added support for the parisc and parisc64 architectures - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3) - Return -EDOM on an endian mismatch when adding an architecture to a filter - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run() - Fix PFC generation when a syscall is prioritized, but no rule exists - Numerous fixes to the seccomp-bpf filter generation code - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3 - Numerous tests added to the included test suite, coverage now at ~92% - Update our Travis CI configuration to use Ubuntu 16.04 - Numerous documentation fixes and updates - now gpg signed, added key of Paul Moore from keyserver.- Use %license instead of %doc [bsc#1082318]- Update to release 2.3.3: * Updated the syscall table for Linux v4.15-rc7- Unconditionally rerun autoreconf because of patches- Update to release 2.3.2: * Achieved full compliance with the CII Best Practices program * Added Travis CI builds to the GitHub repository * Added code coverage reporting with the "--enable-code-coverage" configure flag and added Coveralls to the GitHub repository * Updated the syscall tables to match Linux v4.10-rc6+ * Support for building with Python v3.x * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is set to true * Several small documentation fixes - Remove service file as we are not based on git- Update to new upstream release 2.3.1 * arch: fix the multiplexed ipc() syscalls * s390: handle multiplexed syscalls correctly - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch, 0001-tests-replace-socket-syscall-references-in-15-basic-.patch (fixed upstream)- Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch- Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch- updated to final 2.3.0 release - builderror-k316.diff: fixed upstream - i586 testsuite fails, disable for now- Update to git snapshot 2.3.0~g96 * have libseccomp build with newer linux-glibc-devel; "multiplexed and direct socket syscalls" - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch (no longer apply - merged upstream) - Add builderror-k316.diff- Add baselibs.conf: systemd-32bit-224+ links against libseccomp.so.2.- Update to new upstream release 2.2.3 * Fix a problem with the masked equality operator * Fix a problem on x86_64/x32 involving invalid architectures * Fix a problem with the ARM specific syscalls- Update to new upstream release 2.2.1 * Fix a problem with syscall argument filtering on 64-bit systems * Fix some problems with the 32-bit ARM syscall table - Drop 0001-tools-add-the-missing-elf.h-header-file.patch, libseccomp-arm-syscall-fixes.patch (applied upstream)- Fix ppc64le build: libseccomp-ppc64le.patch- Fix some arm syscall constants libseccomp-arm-syscall-fixes.patch- Update to new upstream release 2.2.0 * Added support for aarch64, mips, mips64, mips64n32 (BE/LE). * Added support for using the new seccomp() syscall and the thread sync functionality. * Added Python bindings - Remove 0001-build-use-autotools-as-build-system.patch (merged). Add no-static.diff. Add 0001-tools-add-the-missing-elf.h-header-file.patch/sbin/ldconfig/sbin/ldconfigs390zl33 16466713762.5.3-150300.10.8.12.5.3-150300.10.8.1libseccomp.so.2libseccomp.so.2.5.3libseccomp2LICENSE/usr/lib64//usr/share/licenses//usr/share/licenses/libseccomp2/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:23188/SUSE_SLE-15-SP3_Update/218ca872f6b301372a0d2fb2660e4ba4-libseccomp.SUSE_SLE-15-SP3_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=955b849228c0e25405bdd60bf2347cda3f4b06b0, strippeddirectoryASCII textPRRR"dk&Mm"O@utf-81e044c590248d3605bc51f7d78bcc2ace3a112231f7f697c85f8da4afaf42e7b?7zXZ !t/0]"k%]dU)^kc4ױ ׌>OwgzJHI nA6PCHc /a;k[N#AVRSu] Hӧ"GJ_βC5q_a"خ|ɩa)=7YC_P /X R¨Sl/ xlͦYaۗy8ٔ VYs^VbdHq #s2!ԪTGu\qƸElw-lָ?QμJ"`Z6,dkZN)qp[tbCKa)y6퉿yu[x^6zNN7Go6$keИLw)ҍ"NPlf7ڲac/8`A5Y:N4-oⵖ'g~fC4;3ْB(E>N"L>pڜ 䖂'#u%QC1w3J&O 6Uc"cl(k!⟖"Z˄s=Z@-bOT);8,[:AObzn kt)Lؒ89'li;KHJU'$q@mx_à:k*)V2TOBXrl'? {2 stTz(*E]dޯg|stM =YwJz#:{ ãsNu3vf:6`;W S쉆$v iSu&iJa" g/蓋ab2K0r/Be B,ʎhÒDGWD~J&|z(TV$"Hs ynS=29~Ys㇡y@k+ l#vi&`p`-`+P%n0 Dô4;P 8У)^4)W}jTRhב_iCAs*SQ0|Q; sdƷN0 z0fKQ5}ħ\e{r{sI1!r=鈽 bi"+L%lCg . D]wZ MYT-do%^mHW#»gV Nf^j~x@ wׄ5fR5knϓjPqH> >'O;;73mgAȯ4ƶSnߏ@]"_硇,#bA}g""U0n"?lhRKqRlƪ<doBbWd4k'q'v 'l%>++Lz91H۰[m 4.4"f5ge+R E>`i~5L3P2Ky0{+ P@Z2+ xZh$ϣmH 5ePe=.f-7ZxMrxGE"`5;53S ?%@Hf qxG@ Z̡0cQ2s /%{u we5Mu5]v Mݑ9Li ܱ"kx:\W-2^잊2Vj 8W(/2s15g!wPX PVײ5u- U;|A[E"1 ov՗ߵx'O,'I g;f1i3I2`X4}Rl@jCӒMm*d-̖ Hڅ[&[KJ;!Q^&$+fԼd6<Пv8t2 FA2~ZvzR(N$@Nj4~\0uq^mJ*.?¶5 Ȧ-|ؤ2΍ա`ot4)&yrV yRGgmlf'.Y {D-`[(R{Vv"TK.4:H ôF=]yZj'ՓaG?\SJĚkX%Lzi@-sʈhh$Srz'o"O Sh ɇ023G=O!޴nǭ43`lCOٲ6\8OT8*ޮW1&MCs)41#|rEN HIJbiY4oC6 *%TmZR*BnҸm20!]1?rjIr9YFfTiG͍۱(,w]pmgdfÖ{>eI0~du;q{fm8wYno).|J3 :NL>;¥EXv:lNQj_$v2 cyw֏H}$Oi7(|#i1xuLc9ԌEӦ)n˶N('fv?<[LB$ɤ~r'Ӻ9_]Ì G/2|,h n>E<>s7Ed8:J-TG5n=KI\D"wO8 G\&Ojȶ%^8E&jGkev{ݳ8SdjBrAq57^+|F`JWqSD.XUB3K.m¼ovlkuf<_=Fq^ #ܐ#ߩ{4YQ5:GԽuxN^'Hˠ# {H]~2)liӐ=3dܕ~\{ &,2yގRж{/aؑFԢWɨX B:F՚TC̸:F+R|𑮿:x."mn2, H4K'ZP6F3oPc J^W.eۯ l);Dk(;V  Q]3yG[!9.nߎ¥jYP.6DE@U\sY3ЃɯAufAQ ~묃Y͛W]{?2QCC$Bԅn#&yIcV31)JFaƈ؋&(xQm'/`ޘ?_ {A9FG 3z?4+1LGIGSc+ }ŵϿu_`=޶f8V{'yFUa$>0Wm@oyO\{^#AmϖfDEA((j59;`$x'i, 7[C% ҧoiHG?6()o[0>OxN*R9+s௼^Ey}e@H0>8`Uo`'^{u%x(VjloMN* 0xuM?Y\m^x#w:e7l,}["mc>hV]n.F@-.>h 2p!0]o&f~uIsގ9¬Q iQ˅pJ-җmh9S8@XYHm:?@o! Pѻ,_'Ɏ\UfT: ܆ï D Ĥg ެ'{-bwb";= D00mK[ӊWx|5}yTƶr%"C'loDwH^~.v%B]?y.@-l7gTG]A/]'CS6LlSXjB*k=U ݤO1.EU`T5f\ϧEA>^iʛ]*3: f&kUuc˂Mk঒]cJ^9Ð8栟ț[:}sKv* hȩDL.ڌy[Hң-l( 9#.\ 9Q&1=)D % i7&cȉ{:ݙ)~Fj·e'WΑjWԧik^%i V_Oó˚}A2(*h'SzaJN*i˺1l=ռy2@jޅ6wyOK$^vSROgcӦ@!6c85iz̕Dd7nʓvL&ⰱNL8s݀Yu`/pFN*K _]ӥ N0+:EL;Kt.[*Z*\Mr,U !k)>A@KGWQwpËvÇC<Ʒ'S"JPG'F^W&9!gךP!Ѱ,P#w×"PXwiť/ܾX K4'׳YukG],$G5k|G?t5pqDntoqfWqll+-;)M9NzRy{mgZ|~T &8m{Gގy$3 إAH2X6sހ2ם}qJL D}QJ.kQ|%[qL^.q`Rm=I:^*ȾTX10`@ YZ