ipset-devel-6.36-3.3.1 4>$  Ap\Zp9|{61$KZbz!<|ۛڌߵ1d720cc2c1691ea1765cad5d2e27ea27060df30dfb1399d1aebd9f3c014890adeb458ce8ad56f7c3c570115003e479dbe5a3e0f65[4\Zp9|7mbr Uqk)p2RKYAQ?=O{}̎ (?0l&Wyږou|_rc );V<,EeJ6TWxu-J o F]RWlMi&}G&L{aTL2^ %mzv*sژ]^sBۢEkx#hHq`sM':kOCql;`]n,Hyx.BȌ>p>4?4d  @lp| (   0  0 d    , ( 8 9 h: jF/+G/@H/I/X0Y0\00]0^1wb1c2d2e2f3l3u3v3lw3x3y4Lz4X4h4l4r4Cipset-devel6.363.3.1Development files for ipset extensionsIP sets are a framework inside the Linux kernel, which can be administered by the ipset utility. Depending on the type, currently an IP set may store IP addresses, (TCP/UDP) port numbers or IP addresses with MAC addresses in a way, which ensures lightning speed when matching an entry against a set.\Zs390zp37SUSE Linux Enterprise 15SUSE LLC GPL-2.0-onlyhttps://www.suse.com/Development/Libraries/C and C++http://ipset.netfilter.org/linuxs390xp="D+ Tz# AA큤\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\Z\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.so.11.1.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootipset-6.36-3.3.1.src.rpmipset-develipset-devel(s390-64)pkgconfig(libipset)@@     /usr/bin/pkg-configlibipset11pkgconfig(libmnl)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)6.3613.0.4-14.6.0-14.0-15.2-14.14.1\QZ@Ze@ZP@YLYcYXXVJVVU@U@TsT!`T&@SRnQRcRcQ@QkQ& @P@P@P]@O@OOW@OJkstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dekstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dekstreitova@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@medozas.dejengelh@medozas.de- add ipset-6.36_service_names_for_ports.patch to fix parsing service names for ports. Parsing is attempted both for numbers and service names and the temporary stored error message triggered to reset the state parameters about the set [bsc#1122853]- Update to new upstream release 6.36 * Adding a IPv4 range x.x.x.x–255.255.255.255 could lead to memory exhaustion, which has been fixed. - Drop 0001-build-do-install-libipset-args.h.patch (merged)- Add 0001-build-do-install-libipset-args.h.patch [boo#1077037].- Update to new upstream release 6.35 * Userspace revision handling is reworked * Backport patch: netfilter: ipset: use nfnl_mutex_is_locked * Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit() * netfilter: ipset: add resched points during set listing * Fix "don't update counters" mode when counters used at the matching * netfilter: ipset: Fix race between dump and swap- Update to new upstream release 6.34 * Reset state after a command failed, when multiple ones are issued. * Handle padding attribute properly in userspace. * Test to check the fix to add an IPv4 range containing more than 2^31 addresses. - Remove ipset-6.33-export-func.diff (merged)- Update to new upstream release 6.33 * Report if the option is supported by a newer kernel release - Add ipset-6.33-export-func.diff- fix build for Factory- Update to new upstream release 6.31 * ipset: avoid kernel null pointer exception in ipset list:set * fix bug: sometimes valid entries in hash:* types of sets were evicted - Update to new upstream release 6.32 * fix possible truncated output in ipset output buffer handling- Update to new upstream release 6.30 * hash:ipmac type support added to ipset- Update to new upstream release 6.29 * Fix race condition in ipset save, swap and delete- Update to new upstream release 6.28 * Test added to check 0.0.0.0/0,iface to be matched in hash:net,iface type * Check IPSET_ATTR_ETHER netlink attribute length * Fix set:list type crash when flush/dump set in parallel * Allow a 0 netmask with hash_netiface type - Restore unreviewed deletion of KMP production, undo spec-cleaner refucktoring - Add ipset-destdir.diff- update to 6.27: * kernel part changes * fix reported memory size for hash:* types * fix hash type expire: release empty hash bucket block * fix hash type expiration: incorrect index fixed * collapse same condition body to a single one * fix extension alignment * compatibility: include linux/export.h when needed * compatibility: make sure vmalloc.h is included for kvfree() * compatibility: Fix detecting 'struct net' in 'struct tcf_ematch' * compatibility: Protect definition of RCU_INIT_POINTER in compatibility header file * netfilter: ipset: Fix sleeping memory allocation in atomic context (Nikolay Borisov) * userspace changes * handle uint64_t alignment issue in ipset tool - disable KMP build as we support the in-kernel version instead. Remove ipset-preamble file that is no longer needed [bsc#962345] - run spec-cleaner- Update to new upstream release 6.26 * Out of bound access in hash:net* types fixed * Make struct htype per ipset family * Optimize hash creation routine- Update to new upstream release 6.25.1 * Add element count to all set types header * Add element count to hash headers * Support linking libipset to C++ programs * When a single set is destroyed, make sure it cannot be grabbed by dump * Check CIDR value only when attribute is given * Permit CIDR equal to the host address CIDR in IPv6- Update to new upstream release 6.24 * Alignment problem between 64bit kernel 32bit userspace fixed * Potential read beyond the end of buffer resolved * Fix parallel resizing and listing of the same set * Introduce RCU in all set types instead of rwlock per set * Remove rbtree from hash:net,iface in order to run under RCU * Explicitly add padding elements to hash:net,net and hash:net,port,net * Allocate the proper size of memory when /0 networks are supported * Simplify cidr handling for hash:*net* types * Indicate when /0 networks are supported- Update to new upstream release 6.23 * Order create and add options in manpage so that generic ones come first * Centralise generic create options (family, hashsize, maxelem) on top of man page in the generic options section. * Add description of hash:mac set type to man page. * Add missing space for skbinfo option synopsis. * Support updating extensions when the set is full - Drop sovers.diff (no longer needed)- Update to new upstream release 6.22 * includes the new set type hash:mac * The new skbinfo extension makes possible to store fw mark, tc class and/or hardware queue parameters together with the set elements and then attach them to the matchig packets by the SET target. - Add sovers.diff to counter missing symbol errors- Update to new upstream release 6.21.1 * add userspace support for forceadd * fix ifname "physdev:" prefix parsing * print mark & mark mask in hex rather then decimal * add markmask for hash:ip,mark data type * add hash:ip,mark data type to ipset * Fix all set output from list/save when set with counters in use. * ipset: Fix malformed output from list/save for ICMP types in port field * ipset: fix timeout data type size (Nikolay Martynov)- Update to new upstream release 6.20.1 * build fixes for kernel 3.8 and the userspace library - Remove 0001-build-fix-incorrect-library-versioning.patch (merged)- Add 0001-build-fix-incorrect-library-versioning.patch- Update to new upstream release 6.20 * netns support * new set types: hash:net,net and hash:net,port,net * new extension: "comment", for annotation of set elements - Drop sles11.diff (no longer needed, upstream has better fix)- Update to new upstream release 6.19 * This release adds per-element byte and packet counters for every set type. (Matching these will be available in iptables-1.4.19.)- Update to new upstream release 6.18 * bitmap:ip,mac: fix listing with timeout * hash:*net*: nomatch flag not excluded on set resize * list:set: update reference counter when last element pushed off- Update to new upstream release 6.17 * Fix revision printing in XML mode * Correct "Suspicious condition (assignment + comparison)" * Fix error path when protocol number is used with port range * Interactive mode error after syntax error * New utilities: ipset_bash_completion, ipset_list * Ensure ip_set_max is not set to IPSET_INVALID_ID * Resolve corrupted timeout values on set resize * Resolve "Directory not empty" error message- Update to new upstream release 6.16.1 * Fix RCU handling when the number of maximal sets are increased * netfilter: ipset: fix netiface set name overflow - Remove 0001-build-support-for-Linux-3.7-UAPI.patch, merged upstream - Remove 0001-build-Linux-3.7-netlink-fun.patch, merged upstream- Update to new upstream release 6.15 * Userspace changes: * Use gethostbyname2 instead of getaddrinfo * Support protocol numbers as well, not only protocol names * Kernel part changes: * Increase the number of maximal sets automatically as needed * Fix range bug in hash:ip,port,net - Add 0001-build-support-for-Linux-3.7-UAPI.patch - Add 0001-build-Linux-3.7-netlink-fun.patch- Update to new upstream release 6.14 * Internal CIDR bookkeeping was broken and would lead to mismatches when the number of different sized networks are greater than the smallest CIDR value * Support to match elements marked with "nomatch" in hash:*net* sets * Add /0 network support to hash:net,iface type- Update to new upstream release 6.13 * more restrictive command-line parser * documentation updates w.r.t. src/dst for hash:net,iface * allow saving to/restoring from a file without shell redirection * kernel: hash:net,iface: fix interface comparison * timeout fixing bug broke SET target special timeout value, fixed- Update to new upstream release 6.12 * Report syntax error messages immediately * Add dynamic module support to ipset userspace tool * Fix timeout value overflow bug at large timeout parameters * gcc 4.7 support- Update to new upstream release 6.11 * libipset is now complete; ipset is just a frontend * Log warning when a hash type of set gets full * Exceptions support added to hash:*net* types * hash:net,iface timeout bug fixed * Support hostnames and service names with dash- Populate ipset package on build.opensuse.org after disabling ipset-genl compilation in xtables-addonss390zp37 1549459631 6.36-3.3.16.36-3.3.16.36ipsetlibipsetargs.hdata.herrcode.hlinux_ip_set.hlinux_ip_set_bitmap.hlinux_ip_set_hash.hlinux_ip_set_list.hmnl.hnf_inet_addr.hnfproto.hparse.hpfxlen.hprint.hsession.htransport.htypes.hui.hutils.hlibipset.solibipset.pc/usr/include//usr/include/ipset//usr/include/ipset/libipset//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:10273/SUSE_SLE-15_Update/33022e4a81d0ec463bf0c893a05b8d50-ipset.SUSE_SLE-15_Updatecpioxz5s390x-suse-linuxdirectoryC source, ASCII textpkgconfig filePRR JOW3_ģutf-89e3994098a4453adedbde16bddf7f3f2e12a28f48bc04649dcc384d09841215d? 7zXZ !t/ȋ"#] crt:bLL h'\rb"/D PS[z7`s5nZ b!CiYeWYC@jB7^wYE,n%aqּ{&2F2Tg#t#OXOcgKk0)vuYI?0f5OL@ȢIWyHb!J\L1|::(a(L˜QԂ:*6ms#š ~쯖uu ;5fgy`.O47ٝ֓d 9#bgW Ll6t1(\ɻNV#Fa2 6 nwgBlðSӉ_"۞ RR ÚG6"r/qy7|/8 ΢/=p>A3aw1>_(ʏQq7 `g3$ʌM/ #7G[ f4sQ@-$ FjHS_Wk>*ؽy},L :ŦycNOT*TIx骗vCznįTDi 1ܣX8~#hTZPյ_f(,\(+E ma@Bi1&֏?O/ڣmzHpިoMIo;M:Qn4c @vqse8Gj%taLJ5(z@̗"U̙6DvZ `L^"G uJliz`#U 󬭵l5+_26&c k~8/2tX&-e(q[N%%]9'Tv*q8y\7pUL"_OFB(KN,#/Sirȹv }<38̊HzV1Lq8ь uz-`vq؂+?!'e-]B8Dp\:z^zF͏]Daf3j=.'m(e hu]_}L R 5'QkMco*ls V'q?_\+'N[E^Ņ1Ƅ,&MM>og-۷+*C)ݴ 1J9˱7㑨ѩ qWήnWOh!=39tnoJu+ 0=h:&mIL&zN&2P-7˥kO?'CIj mTCM2yXvo IJ]-|N5syi!:hdyI†lc:g4o(ɩpFg4e@ܲ3{cWjc`47SpG"0T&$rE8Ӄf4MzHJ{)Qsэh jgf}_hӼC_@rf,p52.MPMPĞ 'f Sm>r(1B{{,a7ZBLy };:. +`W@@\ï[BHkpReG'Oe2q%iC=DVe PkOIPl:K1yȒܸ@ch's}م١־,* l|L;FtrČ8}Zn!O r+G[$9cnep-A0!)c.Ci#UTsf'L)m{oXZtb-PBU5Ah1JQ$`spj_u'3ѨoNJUI;%vxOBenw^dGyҪ+!r+_pN6{FZ)MPX.\?`}wP%"'P^pCp+gf!Қ*2zS ,=NNa8ƈRy.bVE⺱r&XC UL]' vRVָ;Hh~V=!u'C񌍕7z?2Q4e K7knGwn7Ƒ>Ŧh;` 7N;+&x=8^ kc !A;ψ*+A޶0Ph*"ąb|3}H4 Bsuu{*]Y[Y@<}%CxN`MOKHHyxGK2W==DɾLm#ȴФ@pRԩy}1f*~0~V.n[-y k't"uYA[c&E#jo6@}.:uuƒxPa-]ʼn[ҹƼr 'o{G `9 ͵czg^%'_W3U%986!!鲴$; u-ZF ȶa#ݭmQ l9zn&I"ӕhBb4^jO_w0WZ֫;i6|Y>0~6|6@ͣM|WhPL{:HՒ?9+t9$ w3,Tν% qW-?3^W) VLR 4Iy]ܮC CFj1J?l Qnx.Ϯʹ> ި8e{0>P<{||yiU4DžL:xFlO] A$,`uc oB[c Յ:Hˆ785Hbw#‡ \-aˣ5 f#;iq(1n0Q2]Kw_z1F*ɉ,ޑZ *eb?Pv.=.z2@ګk՟?^[Yk$ďyu6}BQ4)-&OM@1YԚ Yt B|ѹ0`ͅx'/x?>X}12~D7? (jziݒ ]zAڎ̮:V1 Wa W6!4ywm.)yۨ04 KRXq ,/pʛ宎;G9$ kK~yj0fQiyɅ1YpBbB W FBT.nk1۪\}FQ+ [;ES1O\xdI0Haؚ[} pR]&DlsRȺrp \#᪗eh7@SY0ynhq;R> J"w/b*P;{ҳblofM)Vr%^Ҙn*Q`GK`~Ť^_}/:,9Qu!/2)2X$KY:頗!=mS3蚎N Jx$C~adUK@PL잰|"ѣ0T7] ! cj2fCMÛ">F%|cM@P BNkí/}@= י k BMНp"g ϻ7-]p2=Jp (G{x|#iՈ%*rb'gWZbr&5tD.+|Pn])[AKb|,pBRIC&. *'tG#62';^Mj B)[R%v**-o1T>RQKCNxpOoJEGv'^(S\r#Q?8@|CJn&rsOFvǨn)fSt18L:'džN9&ZĭN[SESoBSi+g .TmJCkCNyZz2{~^Ds"Ub`%6}&60 #s-a@FND=)̒UUEk/ZMp06QR w8aE202ـw2!8j0?"R.sumX[43p2th:uL1yZG[rçP(. :SWlW6HNX7Z-ZA=~u~@DDn YZ