libseccomp2-2.5.3-150300.10.8.1<>,V,b&9p9|K M7%/ P+q0NT CƁuYw=#V^`d?.Mf!M3 KZj5g!h<!M lRfҡYZYrƯ u ͊D22:bw&GV "9Rp_R=~YaR;A`M`XB*v䭂ff ,_?\YQqxdr<+fW>@(?(d " NTXdh   $ , <  8H   (8!9T!:!>% @%F%'G%<H%LI%\X%`Y%l\%]%^%b&"c&d'Pe'Uf'Xl'Zu'pv'w((x(8y(Hz(\(l(p(v(Clibseccomp22.5.3150300.10.8.1An enhanced Seccomp (mode 2) helper libraryThe libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API abstracts away the underlying BPF-based syscall filter language and presents a more conventional function-call based filtering interface.b&9ibs-arm-5hSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/System/Librarieshttps://github.com/seccomp/libseccomplinuxaarch64 _lA큤b&4_b&4`b&9aa6b39f7fd9e9fe4571cc05d967e6e7ee7a0483b11b984308495903f82787b666102900208eef27b766380135906d431dba87edaa7ec6aa72e6ebd3dd67f3a97blibseccomp.so.2.5.3rootrootrootrootrootrootrootrootlibseccomp-2.5.3-150300.10.8.1.src.rpmlibseccomp.so.2()(64bit)libseccomp2libseccomp2(aarch-64)@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3b%aZ@a@aa?=@a/k@_@_X_Wr@_Wr@^3^J@^r^!@]f@]8H@\@\6\ key.- Update to release 2.4.3 * Add list of authorized release signatures to README.md * Fix multiplexing issue with s390/s390x shm* syscalls * Remove the static flag from libseccomp tools compilation * Add define for __SNR_ppoll * Fix potential memory leak identified by clang in the scmp_bpf_sim tool - Drop no-static.diff, libseccomp-fix_aarch64-test.patch, SNR_ppoll.patch (merged)- Add patch to fix ntpsec and others build (accidental drop of symbols): * SNR_ppoll.patch- Tests are passing on all architectures- Backport patch to fix test on aarch64: * libseccomp-fix_aarch64-test.patch- Update to release 2.4.2 * Add support for io-uring related system calls- ignore make check error for ppc64/ppc64le, bypass boo#1142614- Update to new upstream release 2.4.1 * Fix a BPF generation bug where the optimizer mistakenly identified duplicate BPF code blocks.- updated to 2.4.0 (bsc#1128828 CVE-2019-9893) - Update the syscall table for Linux v5.0-rc5 - Added support for the SCMP_ACT_KILL_PROCESS action - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension - Added support for the parisc and parisc64 architectures - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3) - Return -EDOM on an endian mismatch when adding an architecture to a filter - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run() - Fix PFC generation when a syscall is prioritized, but no rule exists - Numerous fixes to the seccomp-bpf filter generation code - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3 - Numerous tests added to the included test suite, coverage now at ~92% - Update our Travis CI configuration to use Ubuntu 16.04 - Numerous documentation fixes and updates - now gpg signed, added key of Paul Moore from keyserver.- Use %license instead of %doc [bsc#1082318]- Update to release 2.3.3: * Updated the syscall table for Linux v4.15-rc7- Unconditionally rerun autoreconf because of patches- Update to release 2.3.2: * Achieved full compliance with the CII Best Practices program * Added Travis CI builds to the GitHub repository * Added code coverage reporting with the "--enable-code-coverage" configure flag and added Coveralls to the GitHub repository * Updated the syscall tables to match Linux v4.10-rc6+ * Support for building with Python v3.x * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is set to true * Several small documentation fixes - Remove service file as we are not based on git- Update to new upstream release 2.3.1 * arch: fix the multiplexed ipc() syscalls * s390: handle multiplexed syscalls correctly - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch, 0001-tests-replace-socket-syscall-references-in-15-basic-.patch (fixed upstream)- Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch- Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch- updated to final 2.3.0 release - builderror-k316.diff: fixed upstream - i586 testsuite fails, disable for now- Update to git snapshot 2.3.0~g96 * have libseccomp build with newer linux-glibc-devel; "multiplexed and direct socket syscalls" - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch (no longer apply - merged upstream) - Add builderror-k316.diff- Add baselibs.conf: systemd-32bit-224+ links against libseccomp.so.2.- Update to new upstream release 2.2.3 * Fix a problem with the masked equality operator * Fix a problem on x86_64/x32 involving invalid architectures * Fix a problem with the ARM specific syscalls- Update to new upstream release 2.2.1 * Fix a problem with syscall argument filtering on 64-bit systems * Fix some problems with the 32-bit ARM syscall table - Drop 0001-tools-add-the-missing-elf.h-header-file.patch, libseccomp-arm-syscall-fixes.patch (applied upstream)- Fix ppc64le build: libseccomp-ppc64le.patch- Fix some arm syscall constants libseccomp-arm-syscall-fixes.patch- Update to new upstream release 2.2.0 * Added support for aarch64, mips, mips64, mips64n32 (BE/LE). * Added support for using the new seccomp() syscall and the thread sync functionality. * Added Python bindings - Remove 0001-build-use-autotools-as-build-system.patch (merged). Add no-static.diff. Add 0001-tools-add-the-missing-elf.h-header-file.patch/sbin/ldconfig/sbin/ldconfigibs-arm-5 16466721572.5.3-150300.10.8.12.5.3-150300.10.8.1libseccomp.so.2libseccomp.so.2.5.3libseccomp2LICENSE/usr/lib64//usr/share/licenses//usr/share/licenses/libseccomp2/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:23188/SUSE_SLE-15-SP3_Update/218ca872f6b301372a0d2fb2660e4ba4-libseccomp.SUSE_SLE-15-SP3_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a8b9f3113f98e6717842b0bd20b84b4465dddf92, strippeddirectoryASCII textPRRRR-nP٤r_4@΄Cutf-8b59c782466f0e79f7ecea20f3fbb86fde8c2f58b2f0c6980ce8e4438e28b99ec?7zXZ !t/I(]"k%]dU)^kc4ױ ׌> e"89Fp*Ғg^)Tk-2Ó2LV|ɽFG6Pq훹l?۠r'W2K$:: hHၓsPRVi¥\сk $Sǝ th.DG8n'k,]a^2ƈ'8baƱDFPBڔ)[V7gUwda1J_Znfi L~`xArsAVv]yXPgjծݑ5aAԣw~ӌ;)Ą .,H .0E_T)ح :5ŴyhVPX(Z|A(OʼNQ)ߨQ.9^SLj`\p˨^%==@v=5[!):@K OWp3"Dg?V'SSSJH֝MZg~_>,C&EѦjB Gl[`JP\{`WI[҇&ݣشCN1vYA+=^~*U)>wׅ%P8VK`3k BF' XN5Fwڊ`Yrr Y" b=@ߗ\96&Fm&twZnA/׃R ʬޒL))j侗/N}7-Hs\SL@J~.E_ 9LW>* I5ٛzOij|˸!rJSt?W]5Z|qR oGa~O3^3%$ |:)<92Z1'[ y[I`ֳ԰}~r)4S/U(@SOx PAErY VB`oTo n';[Ч5À+  yD$HiX >%Fb r,T^Fm&wy'Y^gi0Wx ٘tt.S_/ק/n(IK ) AѩT'W^YZἣ8:Aa$,O-Đ\ùdݙJ}#,`Tc:#4%*gUd :AP}"sYI?xO'` 9:zN ?-ߐ=]A b6qK'A/#՗RQᅓ,04Yȼo*6bPʶlmbjܑ `)&M Z"I_eIT6]6- Ǩ$||<"JwFzA ;"G7/a}4|tyLL6 5ϫH^T Kϛpolsl+"@x * PEoٿY摃gbpeh@?;WdtK!?/ʬj{@C,n5wG\(mF"mGlׅsAQ"SZDb^nra9'2fb aO$ TM׈W]'qP5V~bpDGhSY ŚqKS<6_sȃ]Gz%뒣MʷO țSA8frYr 3Ld%ˑHF(Z-ݩyb *qk\lOfũ_*Gգl M9M`Z(Z[7ZiӉwiM-aOȗ\SOβV{#s{dbigZSȽ~Y~w>T&>yt8FPFUes>̛]6!։R/vA"a-8ך#Cq2{oQ`AԸpMlv+<5CTgu,#xaNG_+a 2Q3^Kh}W]d5d#`3bIFmx4x4^h!) L Tz%( MH[h5p wK?~h'erhp]P4y1_'ZoT)ChJ*6Y y[}*(꺌.@ԍHJ3n%ݞgZjEsx@Thaj 0U\H$OMU\#Ux;pmP*wO:g /#~&Ԇ,KrD+LT#2]6BS']h;֬@[$qo Fo-V/m QLܠZ3R [tTG/8t(ΪNp"!X]+ؠ-_YKp  ^ >ڝϵ*sO.QkҦ!;]$ [esZx,0mް>DwS?Νc-6(“UL&AjU sݑ}2%"TX@s^<E_;Ϊ|ݳ%{hg ͧM>d@i-ôB*@C郁PSJ;QB 8vfuh6.ַk8,&H*6z3Vc>~BkJUqKU#q#cJ eSڨ'T!pyz ں(2VBK:"f  v%OJ$RJtU33h#WsQ @#$F,Epw[t:=60zI;OFp(ϏưGf(/1qE9'BHY$+Gx6xno \>‚5Dm U3851%%))_V:1qN0W(g;- "tLTXYb:VL͡\mg,yFk_0^JQvU=9[8.8SN/x<BAQs&'@B@G +O-@@Iw.PzGTj3Tŏ :NػyUoLڊ*hg1:F wZgr2NW.NF+uZt\Te3!4٤3 >[Y8@r;bo,C85pG%H|)F<VqNjKw.ϮB0.ZnoµM0hWDg)2/$!yDiD?6 fzi QXS4.Z7e'c7d,n|u<- [1KQ[T䋙%_Ic-;_ Q3IkbAͧuj_XHPYEADE4̆9r*#De1 x_̟oq9ARYq=Uϔ*`n@,Vk)Qmqbƀs?BxCM0[q6]\AIwczL=YQDXAiܬcsXS R"K?`+.f״~5y%,pZ~Ֆg“yX\&FfQA`'I p@˂؈ڢ*bUOǬ-mų8%!Qҋ9L~4  RD2ids ##r>AMbk V؄.eZ>ƸHWH.BU5*WNάrRClRN9/:z(%Ffȕƪ0AA%`^vhɺm"1`f>6V)̜ۚy^ F ಼,>u>WE!¶ i I -M+09p_ J)%4Y\ :(۶q3F&VCO!+PupQ׽1A :; dʹljM6~C߄"P$0V0o1/? im bRM O,oCɘ6 (IQx;KXrw\fZUUw2ZD3a:W! 4+O*gM-Nr6I]CLrʬsJ' GeJlV??݄*2zMxCy \sEZ2*m*PHbIzZS% Eb7J`r1 8jQ/oz3G7!@9unWr:$ mnQȭ+Ǡ[h4@=!G)P@a*|'{[ɻ"|<_BDVK q^ieCF%QFRg3y讵,D-&zsLصpˬV- APTníˇHT3zڊ;MqVo{7k*_x7!jr/DĠ*e)IHƘ)Ƥ*?g?T6.dP3-/sZ#yϐ85wMPY~ho闕E(iDP9:Ҁ4|:0.aWƠQf~h0$G9‹ܪ\_YZMm'壿uּ\LhK45(:eMl"f-9@m` TX "@Adk Ƈ+:e?\rDd1b5/"}(t&_<$[̩[A4:Bbj4oP(mא\H c`H{fy; rV~)G2!zD=bxZǠ }h=ÕI>Z#[?R'/8ߙPI|>J$XfshSRl[0vvDMhNGxKR`,/%"B* gSEL$ȘTf/g𵅫 ( ي^: BGCXb]^Oc|)vi(i7C:Ed$ɚ }ա^?<>@0{{풎&5珑q1%#ץdBK6Π )A&;1:`|3R\M;G)XEA{y yC>|`+Y[(#)0gSpK쨊> g$mo1P;qdlSPgjHyfS ! ^-Q@'r5n[k"4k}4"84jL[Մz(#bn&lN,)OK4oࣶ@c Ҟ#ۈ=#)W"N3``?m1))P CB0Uz!]?2{PqPtN@ +aXo@ě}xZ˗hh2c\XO";Z-4l*Aؓv?P,B! S`OVE 5ٳWt)OY(7z_>Q_RVG?qͽ=!&y0qCYmED "PF3Zz H>%gaI*e;`A5n3 XhE lw=:ؼlAvj#@/|Mu# A -qd]_us]fzq㫥pag +/MC52U߰F2Y}{l%5)OkK ; 5<}s{ۯf&eD/4D)-ks('TEb{\>g&1Ęe+jR9P_C?ҋi%qZJB:"H`!t¢᯦1n[q昳x#\T6<$Ҧ,v4]e8=i ;Dz(sezT3 3]|ާ\r9LTN?/Nfwo e2unF؆E-CO'0?[lls}^(24KtAuOasP FF,·$@6Icn|EfYs.օ:OB(:t_~ŶqdBPڎω@dǯFjVHQ5inީV Ykq px9;6?/~Ͱ,] ܸ,eZ2<nшj'ǻH !G2 (nϔo&?hhe Z/y^xzх4], =RkeJЗIw. L[$aJ&@7dfdz=As|(C;@gQ)"'RK~i @x.-${ƗxPRedvzqSr<^OK*KϼL;fS vi+FuE1LQ\SyD>йfL& %UňI}0Wy:i4WjE#:?wJ-ԅH8«DC_Fi/\g1 5+vq<°00pc- 6PhMW|.&V4A!T͏6!UHy 'wuNG 3"  g/e魳G +BM\fЛScic^]zzm.<> aU ^E6xUcZZյKF_؍Gx:@/u㌱ bǯyE^=pNvm 0ruK?,weye)*6PACՉXR$0yԨ/ E{൯vde)d9OEfG{@4Er[^wo~%2f+!ExW⾓1pJXl6=~>Jk~°aоqS=~>@XKG)֤W0ѢK+mKlZj kk:x-~HK$im9yo[/]0/ג.l4B2.rr]tFB%4OݔvҌsU[iJÇ1n^B٣`"h7<Юd!_ȝnDG" s[qS>q07(itǟkJf+[-֥gb=6G+s:VR&p  YZ