ipset-devel-6.36-lp152.4.6 >  A ^l/=„deɁt +]ßE,R0.6JaZOTa ^d,4Nq0lQLjR0$tܔ ~TJnDx  WЋ,ws{u'lӢ ̑( #]LOP]Pڃ/S+uɣt1g Bgz=V.-h%In1~ ΝO01RF׮qcnp-1e5ba3f446c1ab7ade4195a7455cbe07c509fdfc61c0ee0c99a4b435eb4aca60a7e6a73c59460e334dcd4d54dfb548a68f512fbcH\^l/=„:*Q(ģ>>gYpt1'3o`=eB05aZ-ɱhvObI_} >81y%eA^>mpOhUQwiӓh'c* FZ:^"Ir;E{vO9̠jȌ>p>!?!d  Dpt|  d     l H h    ( 8 9 : FeGxHI(X@YL\p]^bcd e "f %l 'u <v w x!y!tz!!!!!Cipset-devel6.36lp152.4.6Development files for ipset extensionsIP sets are a framework inside the Linux kernel, which can be administered by the ipset utility. Depending on the type, currently an IP set may store IP addresses, (TCP/UDP) port numbers or IP addresses with MAC addresses in a way, which ensures lightning speed when matching an entry against a set.^]lamb25openSUSE Leap 15.2openSUSEGPL-2.0-onlyhttps://bugs.opensuse.orgDevelopment/Libraries/C and C++http://ipset.netfilter.org/linuxx86_64p="D+ Tz# AA큤^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\^\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.so.11.1.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootipset-6.36-lp152.4.6.src.rpmipset-develipset-devel(x86-64)pkgconfig(libipset)@@     /usr/bin/pkg-configlibipset11pkgconfig(libmnl)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)6.3613.0.4-14.6.0-14.0-15.2-14.14.1\QZ@Ze@ZP@YLYcYXXVJVVU@U@Tskstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dekstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dekstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.de- add ipset-6.36_service_names_for_ports.patch to fix parsing service names for ports. Parsing is attempted both for numbers and service names and the temporary stored error message triggered to reset the state parameters about the set [bsc#1122853]- Update to new upstream release 6.36 * Adding a IPv4 range x.x.x.x–255.255.255.255 could lead to memory exhaustion, which has been fixed. - Drop 0001-build-do-install-libipset-args.h.patch (merged)- Add 0001-build-do-install-libipset-args.h.patch [boo#1077037].- Update to new upstream release 6.35 * Userspace revision handling is reworked * Backport patch: netfilter: ipset: use nfnl_mutex_is_locked * Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit() * netfilter: ipset: add resched points during set listing * Fix "don't update counters" mode when counters used at the matching * netfilter: ipset: Fix race between dump and swap- Update to new upstream release 6.34 * Reset state after a command failed, when multiple ones are issued. * Handle padding attribute properly in userspace. * Test to check the fix to add an IPv4 range containing more than 2^31 addresses. - Remove ipset-6.33-export-func.diff (merged)- Update to new upstream release 6.33 * Report if the option is supported by a newer kernel release - Add ipset-6.33-export-func.diff- fix build for Factory- Update to new upstream release 6.31 * ipset: avoid kernel null pointer exception in ipset list:set * fix bug: sometimes valid entries in hash:* types of sets were evicted - Update to new upstream release 6.32 * fix possible truncated output in ipset output buffer handling- Update to new upstream release 6.30 * hash:ipmac type support added to ipset- Update to new upstream release 6.29 * Fix race condition in ipset save, swap and delete- Update to new upstream release 6.28 * Test added to check 0.0.0.0/0,iface to be matched in hash:net,iface type * Check IPSET_ATTR_ETHER netlink attribute length * Fix set:list type crash when flush/dump set in parallel * Allow a 0 netmask with hash_netiface type - Restore unreviewed deletion of KMP production, undo spec-cleaner refucktoring - Add ipset-destdir.diff- update to 6.27: * kernel part changes * fix reported memory size for hash:* types * fix hash type expire: release empty hash bucket block * fix hash type expiration: incorrect index fixed * collapse same condition body to a single one * fix extension alignment * compatibility: include linux/export.h when needed * compatibility: make sure vmalloc.h is included for kvfree() * compatibility: Fix detecting 'struct net' in 'struct tcf_ematch' * compatibility: Protect definition of RCU_INIT_POINTER in compatibility header file * netfilter: ipset: Fix sleeping memory allocation in atomic context (Nikolay Borisov) * userspace changes * handle uint64_t alignment issue in ipset tool - disable KMP build as we support the in-kernel version instead. Remove ipset-preamble file that is no longer needed [bsc#962345] - run spec-cleaner- Update to new upstream release 6.26 * Out of bound access in hash:net* types fixed * Make struct htype per ipset family * Optimize hash creation routine- Update to new upstream release 6.25.1 * Add element count to all set types header * Add element count to hash headers * Support linking libipset to C++ programs * When a single set is destroyed, make sure it cannot be grabbed by dump * Check CIDR value only when attribute is given * Permit CIDR equal to the host address CIDR in IPv6- Update to new upstream release 6.24 * Alignment problem between 64bit kernel 32bit userspace fixed * Potential read beyond the end of buffer resolved * Fix parallel resizing and listing of the same set * Introduce RCU in all set types instead of rwlock per set * Remove rbtree from hash:net,iface in order to run under RCU * Explicitly add padding elements to hash:net,net and hash:net,port,net * Allocate the proper size of memory when /0 networks are supported * Simplify cidr handling for hash:*net* types * Indicate when /0 networks are supportedlamb25 1589635933 6.36-lp152.4.66.36-lp152.4.66.36ipsetlibipsetargs.hdata.herrcode.hlinux_ip_set.hlinux_ip_set_bitmap.hlinux_ip_set_hash.hlinux_ip_set_list.hmnl.hnf_inet_addr.hnfproto.hparse.hpfxlen.hprint.hsession.htransport.htypes.hui.hutils.hlibipset.solibipset.pc/usr/include//usr/include/ipset//usr/include/ipset/libipset//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.2/standard/a6aa768f24b90c8af0251da76240054f-ipsetcpioxz5x86_64-suse-linuxdirectoryC source, ASCII textpkgconfig filePRRʱM ;4!Zutf-8e7595e4dcd41b1577d8eb4156ae7f7b1b27a569f0f26bdcbade761500ad66f68? 7zXZ !t/ȋ"!] crt:bLL 4; =6 /rJ{8LuBvޠ;o{Źz?S_oZ9mƗ)5֮ScEF7EN|seIk0pu7A*ӟS3}(Rvd+gfj۫Vx=H  t/YC_P IX8EzZi_n` />DKE+ޯ#^:h7װ89Sβ kڢ=S'CwI7HN qUBeqga2 N(9%B}l Oܥ%"{fJ0Z][O.F)0y*1@.U0fVtZ~7[F7o"ۦf󼖪Jˆ [{d"| gMtO^U$[Xwֽrg; 7qI V>Ra*6wRy摡uy2IQ3{B,Xjj T=}}ӱ?<;׷T0VcvA#XZe z>gM t"" kq`WUA |&mݭ9HةyQlEX.5Y~*߲&+{Yx+R'TP>aד2{H/< Ruq'Zdkq!k,L+^o7 *miec)& 2kY$#&ld~I"Co9;LSiQC0Mu`SkMQp%^ltU=o4@N)\ u9pM3X ˤ{m&@r?MLN;O{; f?~>/2/oqz9ҊɵJ2ҙB](ĒQbD֝6Zr$B7wrD>z0Wez mx""F $DUf%I_29ŭH&RD`q>?q:dag} Rv+LX!r?hGJB'#%u`hJ{_UgqJUSizK>Ж̎ QMt v]e1E4iuBK^x5_'%YsKcV8.;dCp Yy2yͮV%^7}i㠂"aSx(O0Da~'m(6ܸ3] gX3}L^Q>dF׉vt X,-ClIV[g.&0Qa2LխQ!@r7Q|0uвc#E"h'@%z&>BDQk "; bǚCeC0j+/z; !iߎ6`/L³ØēviVJp֢Y@>!\tbjW/b^\u [TUI膀}RU dȀ/և(3~ Yڃ`U"lro"yvO87YƸ X M2sC$zꗗI0U$95\{uTU5 79 Y0s_:DI'S)WYJ ?V}(|7rz5Hp\W>D!xz#ǭa:~%YB@܊1#.dRd`ގێV)Qy=D6H.[FᐆBaNETBpᄗr!U*?#ʐt򔕤8$ƹ&@2n(IL6 ]dMt邜j rXCo|Sj5Ly4n{o0 lMCJ p!]J(VT퍈R;YªkF" Ȑ;=w~"f64W 6Lpk~݊Qgdg4ErېGN/&4 %.:dؾ/H/ e}/- /VY␲JNFGq1pc)MO#q}kD @ÖʈGrV4WGhWfFPG#zh"bɊpq".Y$ 97ˉӐuT_'GUS<KÄ+P/) \:CKyL!1kI^,UH4UH>x!x:SIV.0:߬> 9ALU:#S/˪)OJк&oDye2C1ιl18gDQ6z̍2侏{T.z; ǣJD@I )Uއ-ߡ,wJ%#U=Cd@4ooԶ?b,n٣t_i&% NJpۏ]DzǙI)'>xi 'OvBH7Y'8ӞΚͷ>J+gjpdךD! b4zRϊ"[Ņ-.,dtMHLiɁ{n <~R cDw8}j j>"Źlw-%;Z7Z۪jQ2x I)7P>4uue~fQ nms,6NOEBax' cbL +?Gy9Kr4 t`ؕ r6Q4YsWiݫcKs^Qch芇vr͒3z;)Iȣfdgrn1` x Q]+èq5PUՍ-Li\gHz Z_@"VM(z{6m =pZZ}QS9!7kknzf Sa{ӸץCJX !w}0!ҪNE C6Y75k1j#$Xd V|_ܼʺ{K=V< KqnW<-'S4 r9~*?]Dy22`_Sհ2.7,~Ű./c.`ER*zྔc|3zm.x6FϠAS)ԾLI1y9fC!y0%6dLo52`{5i9IN牠]?ih4/jn髥 *S=%%O4OUnop4XBog=bό!H;8>B^`-R G[/T@Eq$pmwߩ*frwoă3^yz4dKA;}{CBmnzig]^oX"MZ{S|#2VJ5O J:9CWe1pQ7mB5]󃗧Yf4zsZkA"MnvC[G;RVHu/)ԶW zPSbՈ<|VUT3rP$Ďp`gGW|<VR@mf 7G•S3}xQ5S~zW/*crfOv&q2"Y&rD]544`A@ORIJEd}^~;|z5h4wT2Ʒ|D!m:R/C$zoGȊҖ1׿2}"3b w%եRǺhU4l,Q:I#`Y'2C :BiF~?'@x/8ܿ_8gL.4착i8kӀW5ۤ^6E5mRף\GlE7)K.kdަCn:VAuT;"%dBS0E>hjzYa"NL|I LCbޘ6 |nThj̀dcaǁbJ`(6oZyƾ+0T-@(AS 7`绽{Ҿi|# 76ȾVCWLQ^\OI W"ưIۄJ|3 S66O9fT\^Ax1j`AJq4NhnzwԆ o=Jْi;tDF<:+iTH'i*13%fHePXT'\u2Ĝ]2#DɖD\:a;v\nrNX-/} c?xp[NHZ5D0'CͅNȻ8ӥMY#2u2 ~p53۰O U lo8R->,NmLsMۯ,{8.@٥j8wXr܉{Q3`a4.E}f2'TZk9;c<>{fDQ)ζ+̍:;f濰д"way^q`"8J܋*]$pV-]X+y([/m[Bmļ/aݺ45XjfJ^BOV(1!,VWyxK.B#&Ffd*󿶁F]f:da(E k0q19e`|mw)rMiٳy 3%9ŝA6m¾11XhK3jb[ԝ4q6EœR^Bp] _"͆lM)B>Be+{UqԍK(LӠ=6yH"V*}-]fG0i丬zCH!>͂Ј]rq˺v MڝAH~U:%v@Ř[$ x=,ntxF=]H6ͩW̭silbmE??낝 #{ )@7_8^m|q=fDO/\ YZ