libbpf0-0.5.0-150400.3.3.1<>,@c@ p9|P4 zK)!>Eg8L*ɎkD-n#!c,* '8נe?v[Waoc|[Ǎ}7!-,ڻҫ|R,_>ۦi( SZ\8ؙh $XJա[?(ؾ5 "-mTʶD7milN+ZL1=믄? Und@8?(d   K ;AHP T X `  HJ(v8 9 :s >8@GFVGlHtI|XY\]^ b,cdVe[f^l`utv|wxy *z$Clibbpf00.5.0150400.3.3.1C library for managing eBPF programs and mapslibbpf is a C library which provides API for managing eBPF programs and maps.c@ s390zl35!8SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/Unspecifiedhttps://github.com/libbpf/libbpflinuxs390x!8c@ c@ a1cfc2b274d3d779a0c8e02102183b8e4e11100a9850ec926e9a8bca09f3b60clibbpf.so.0.5.0rootrootrootrootlibbpf-0.5.0-150400.3.3.1.src.rpmlibbpf.so.0()(64bit)libbpf.so.0(LIBBPF_0.0.1)(64bit)libbpf.so.0(LIBBPF_0.0.2)(64bit)libbpf.so.0(LIBBPF_0.0.3)(64bit)libbpf.so.0(LIBBPF_0.0.4)(64bit)libbpf.so.0(LIBBPF_0.0.5)(64bit)libbpf.so.0(LIBBPF_0.0.6)(64bit)libbpf.so.0(LIBBPF_0.0.7)(64bit)libbpf.so.0(LIBBPF_0.0.8)(64bit)libbpf.so.0(LIBBPF_0.0.9)(64bit)libbpf.so.0(LIBBPF_0.1.0)(64bit)libbpf.so.0(LIBBPF_0.2.0)(64bit)libbpf.so.0(LIBBPF_0.3.0)(64bit)libbpf.so.0(LIBBPF_0.4.0)(64bit)libbpf.so.0(LIBBPF_0.5.0)(64bit)libbpf0libbpf0(s390-64)@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.22)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.9)(64bit)libelf.so.1()(64bit)libelf.so.1(ELFUTILS_1.0)(64bit)libelf.so.1(ELFUTILS_1.5)(64bit)libz.so.1()(64bit)libz.so.1(ZLIB_1.2.3.3)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3cjDaQ@a(a@a@`@^(@^6^r]?shung-hsi.yu@suse.comshung-hsi.yu@suse.commsuchanek@suse.commsuchanek@suse.comgmbr3@opensuse.orgmsuchanek@suse.commrostecki@suse.commrostecki@opensuse.orgtchvatal@suse.commrostecki@opensuse.org- Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534) + libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch - Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606) + libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch- Update to 0.5.0: + New features and user-space APIs: - libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details. - streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in); - "Light" BPF skeleton support; - BPF_PROG_TYPE_SYSCALL support; - BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs; - BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs; - allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API; - btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations; - sk_reuseport/migrate program type support; - btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description; - btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them; - btf__load_vmlinux_btf() and btf__load_module_btf() APIs; - bpf_map__initial_value() API to get initial value of mmap-ed BPF maps; - bpf_map_lookup_and_delete_elem_flags() API. + BPF-side APIs and features: - support for weak typed __ksym externs; - BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel(); - bpf_get_attach_cookie() helper to get BPF cookie from BPF program side; - bpf_get_func_ip() helper; - bpf_sys_bpf() helper; - bpf_task_pt_regs() helper; - bpf_btf_find_by_name_kind() helper; - usability improvements for bpf_tracing.h when target architecture is missing. + Bug fixes and compatibility improvements: - improve BPF support detection on old Red Hat kernels with backported BPF patches; - improvements for LTO builds with GCC 10+; - pass NLM_F_EXCL when creating TC qdisc; - better support of BPF map reuse on old kernels; - fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself. - Remove patches merged upstream + libdir.patch + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Fix LTO build (bsc#1188749). + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Depend on new enough Linux headers.- Create libbpf0-32bit needed by libdwarves1-32bit- libbpf is now a separate project, stop building from the kernel (bsc#1188419 jsc#SLE-17288 jsc#SLE-18805). - Fix LIBSUBDIR + libdir.patch- Add python3 as a build dependency.- Build libbpf from kernel sources, not from github sources, for consistency with bpftool package.- Reflect SUSE CFLAGS - Do not bother with obscpio if we are fetching direct releases - Remove patch 0001-makefile-Fix-install-target.patch seems to build/install without it just fine - Update to 0.0.6: + New features - new extensible bpf_object__open_{file,mem} APIs and DECLARE_LIBBPF_OPTS() macro to go with them - bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now distributed with libbpf - BPF CO-RE: added field size, field existence, and bitfield relocation support - BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(), bpf_core_field_size() and other BPF CO-RE related helpers available through bpf_core_read.h header - bpf_object__open() API now auto-detects program type from its section name - BPF_PROG_TRACING programs support (incuding BTF-typed raw tracepoints, fentry/fexit programs) - mmap() support for BPF global variables - declarative map pinning support added - probe_read_{user,kernel}[_str]() BPF helpers added - bpf_get_link_xdp_info() function to get more XDP information added - a bunch of other AF_XDP changes + Usability improvements - no need for int version SEC('version') = 1; anymore - raw_tp/tp and uprobe/uretprobe section prefixes added - new bpf_program__get_{type,expected_attach_type} getters - preserve error code on program load failure + Fixes - btf_dump padding handling - bpf_object__name() returning name, not path - ELF section handling off-by-one bug fix - mem leak/double free fix in BPF program relocation code- Initial release/sbin/ldconfig/sbin/ldconfigs390zl35 16757719150.5.0-150400.3.3.10.5.0-150400.3.3.1libbpf.so.0libbpf.so.0.5.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:27678/SUSE_SLE-15-SP4_Update/503997111c77f37171efa5c2d69e3c97-libbpf.SUSE_SLE-15-SP4_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=e50dd42fb12dff1f0f73d08b756254bd6566e7a5, stripped*PPPPPPPPPPPPPPPP P P P P P P P P P PPPRR R RRR RR RRRR RRm@+WS,7L*utf-8afd42dac09c85de0d4650ef8d18e21d4314b3a193093971b88af9ce5bd03a032?7zXZ !t/0Z]"k%ne8^ OfM6Q VEಂv > &IӗŸ2[[7 寄boh.0ZO1ʚ6'V5khO.[ǀӦ9*CKP fU_VTzn Eg3tC4] O9rH ,9s2( @k*+ [J+&sRf.Zuc(_fZ96btj"Ȳ@8Ɗ0T%-ouƼB1[>GL|%rWbuԆIwZYL÷YFN%ݢƿFz`mP AkmG낎SSOH&?N+:8%U;Ԝ Rf uJ+?ăG Ԉ }(ц>bV;O^sSЯ+KHgFĭӀNԼOuC-,okPHk6\1oO?X ihd5 r𘏀ȳ:'*M5l7~‘4̶N a6|+8_i۠ 8G1H`-( F1-:~"#e3~Gԙy;H 4Y=2MI\jES]ivoZGh9ۖF y/#Aث|KߋN+% s!jE0,-FdTe{+}[Lɐg̫q?A,|E#?;%HuB /R7[.mg#zW'ޱoϲޗ,#0W7_ .Ob#ffb^sr5h੸MΤQR*} {ixچdHRn0B~EQ3"su+/ߛSP}rhh ՔKTa C $g~X?\2ܓv;HM-H)]" .IB1T4gRӐ,^_!]l!bOp[lՃE]|:Tȸq9&G MbgM@= OæKiOi-sЀ}`|h $HڢG0zP}ࣃI9eѱH&NL8m6!8{ed ®{u[.ғF|`ǘ a~uSVHDЌ QG C 98mNWeضF?ï o:&|҃*KNi,..QݕpTj2l \4µ͍t^9LaO4`KQp}.RIq⇱ ˛m v,%YcYN{^5bk0'ד-H8~cC{J Y_mVp,tEY-,)|ڈyτ$ ᆁXjJFZõjΐ 7%By7eG? ѦY~~i 6[Q>ml}c1)}$ _oW";FU Gfy HWP$H7"4\]࢕i !H\0O7R$GmvEh N#Po85ΤkZC~\N2<ḌuNp[ǒdwdr64Q-s2^vptSv<۵ `ț++CB'hxð,2I\$vf}Jc[CudJat`ǐIahQ? LI dSi4Xa3'2q460fC5 <>HN6~|wkx$cd6*'Uka6")zj;p%-#b^r|ice!LQ@RӊZs8Nв$Q+4p4@R@gSDj)P \qB\|.Ya<6( LmM|s<$Ut]s}uYzg$KrAr×-c8+l*g8 @!Hq4^0\)ԹኒN Ľ‚ tM)D1G֡f/֪}`$oToˍij||{մAz}*P ^ Qa>BȌ ∳PN}|>'\~e Oq-3x5 w}a5-?A]s͆Mw *8KB#ȂI̓$/i D/ꆺ ׾pΓ;Sjͬ'M Pb@Dې6ntL*L2np4[cgj hn؅R+0{\{bK=2JtwmObۜhCnZ@jR+h /HW~|9k5J|7,0fM<?g}5 vsGæ]=>S~R끱MB*x:6A7ZBSMz۠m#o\_4x-ݲԜ]j``,P3u@?pKHdW]}Pnez޽+:%M}ͨ?``Fc(E3Dgp;Μ+~e,u ">&QI&ҨBYl'U K-Xdŋj^v.&ڨ_+ж!tQĎtCSF>eRt0lK\hy).1tm2$aWs <̻ O)W,%b4Mf: ?d%^/y"K:_C'XQ#_9nM@ж 66x[v$:tVB&ԧUv]Oth{ՙhPL\WW ӕPŒ>y.kJ-nv?Rr}='ZԊ\2jT94Օu\!e%Zoרa d])/:/8Av#AGd'dFXIZ[O ܺ ;"0tT:$]XJrON<1-> e.CbiaFA}[pp+XBw"q{6n͏Jߚj+:^)1RQdj;qvGA%/aY/ ?-|GrEN|~A{H7YW[9\Bi.ڶa"aC?M rs-^kR)ʦoikD  R{|U7͝t<*c2?.[D?XG 3$a$! M6sT+5ſۛ@|/oS]i1^4薕Qy޿휵'kTљM>љn|_qxcvYX@tJ~Vf*|*OJi& xy>]y|Riv(_t*=s㌜nk/)؂#cmǁN7jՕ1I'BN|!"up{KV=X>LV,'I0x"$O޽t%W?XB`q Mf!۪5\KTh ǷF驣'%.2͒\f5/~ϽB قϧݞdK)]Kc._0x֨8xE3d5`kf6ĴbR!znIiq=h .;8fbqv]F @~sZaيKʵLMչPɑhxt|H2k l шl\;Dd]t"ͨ[YWRYl1?m E]j]QkkP7a 8uhI{C3}T:wy߮$T彦wtv=C`@(}PxA80®ɠ ,%T6 vLt;Y{x+;/?6TD㝘)P~bt-y@x^wН:8C.vH澁Hɭ#uƚ2\gưu`)JAEU>\8Sq)ܲ6h"TGRnTLm/Kli)6)og8ҝ)t]q oJy`Z4cG@$S@}5 _ϯ&e~\%1pKNPpJ``(Hm<&.GZJmϯI_7yݚA$SRInc%gխW 7F3C4O]jM(>d/ 3O$s[.B:h)xɃN~EV0U=3Id6DqC<' ޲/0֋IwR,/T~h,wKGI)5nݙ]|EU~}) =Z}4k;#'%=SY61kQ@ .^O-0:O$aJb|B!mSJ{ݬJ6d >`pN8q(xɆnon <<{dBE ra3C|t6Fmtx!eC3X< J |p=!N\QY(Q[twdEʓ!ݶ*?̮zM>) 2Դaf_D#{] npiedgwA>2L8)c&KLaQZ}tX +ZQ>[/JǛxx7k rb/믃!k %}w4_dJ{ݘeU`0ua^ҩ5{3ZvD tۤuuXvwIڇ;*ej7< {6i&D>b:yw+F!¿6P@`6fA E76@P\%~~^)h)F6YK_H;/kx˒=@L4MW坬y)pc5N%[9x1jItoʅplh_k/6P \dDRƒ$$ #[tvzr&SU|[4?R,3<7˧;OXл9jTF#Ef:+Fωw)IR`:yX8Hw*1%މgJL1DHCOw?z?/EQ;,ᎁE6n4LLh[xBNCk,/-\nPЃ-5j\ϔ@cva}x1=v)`Tu Ԇc zAd֎bw{po<= ϻ7>zw|2Җra`Շmhw`36ͣ=6ܥ/y׻658ŤhzZ!*AZ(ʴ.#'yG^YWYku[ZYYqm@D<+L0 ֑*ZDd獓 tDE}ꏈ"(j5:˜! }\S$L9&nclƆVPWE`ݡ7s,p:Pg鈇 nV_0$8#B煫ab)O}Gäd]pP -g6f0w)b=HZ_B\A7L{y_9}9^iݥcM(3/OqixCcWIY TǀC09J4oG.Z1$bj(}dDC3}y2T艓; |&7wyv0~l %Gֺ`mɞak%h伿Qt}(r)m-u&zN9F@pL%5:OwqG!܏%Fol)0|_uw*OI'1#m9#[ZV FK]f2ءQa*F M"VurXL=h3^+pK2@nclbրڏ_LeU5s@hX+'(?Y.N ::CS6/~45t/$Lqqqw4A~ߡkFcR_%k8a$1좫M5wvzِjOxĦ`WG YZ