libipq0-1.8.7-1.1 >  A `pp9|ICt߂u {`1 sLtKVp9HOgzi[aA8hJ{/ *KS~&X[" <`w: rq4gj"(RٮҐ\Db@7V7R-^ʭhO"!oe*RF',KjI۩l5FtEA=qA$+1 ?'Ƨρo@{ۑwe_qp/a24e9e7e25f5e9e42d0ceebd117c899dcda6ecb3eb5e83cf7e7c10b4f3ca7f8998c5523255a180a8e799db21db4ff0ab1e779720.܉`pp9|URI7`5U >L`(ѷN,r^5N9)8axU h>Sv=r)oyyYE u9љߞ5>CKa8G2 z'RO)lt = vE_@ĩn(oH'IH ?75Y/^'S'Rs!b^vQXg>!7/(|H ,j_rwQ ȝ#峆  kteQ)QbTF(O"$ۂ<1A2K"H >p@p?`d   R2P fw      $.8T\](}89:k>z@FGHIXY\]^ bcde f#l%u8v@wxyz\Clibipq01.8.71.1Library to interface with the (old) ip_queue kernel mechanismThe Netfilter project provides a mechanism (ip_queue) for passing packets out of the stack for queueing to userspace, then receiving these packets back into the kernel with a verdict specifying what to do with the packets (such as ACCEPT or DROP). These packets may also be modified in userspace prior to reinjection back into the kernel. ip_queue/libipq is obsoleted by nf_queue/libnetfilter_queue!`pmourvedre SUSE Linux Enterprise 15SUSE LLC GPL-2.0-only AND Artistic-2.0https://www.suse.com/System/Librarieshttps://netfilter.org/projects/iptables/linuxppc64le `p{`pe22857b7b72e7d3cfa2047e423b279fa97a4aa522b78201a09448e028a7df97dlibipq.so.0.0.0rootrootrootrootiptables-1.8.7-1.1.src.rpmlibipq.so.0()(64bit)libipq0libipq0(ppc-64)@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1`_@^א]]@]rJ@\"\9\[[ @[[s[CN@[@ZkZZu@YK@X6@Vs@VRjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dekstreitova@suse.comkstreitova@suse.comjengelh@inai.dejengelh@inai.dekstreitova@suse.comjengelh@inai.dejengelh@inai.deastieger@suse.commchandras@suse.dejengelh@inai.dekukuk@suse.dematthias.gerstner@suse.commatthias.gerstner@suse.comjengelh@inai.dematthias.gerstner@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.de- Update to release 1.8.7 * iptables-nft: * Improved performance when matching on IP/MAC address prefixes if the prefix is byte-aligned. In ideal cases, this doubles packet processing performance. * Dump user-defined chains in lexical order. This way ruleset dumps become stable and easily comparable. * Avoid pointless table/chain creation. For instance, `iptables-nft -L` no longer creates missing base-chains.- Update to release 1.8.6 * iptables-nft had pointlessly added "bitwise" expressions to each IP address match, needlessly slowing down run-time performance (by 50% in worst cases). * iptables-nft-restore: Support basechain policy value of "-" (indicating to not change the chain's policy). * nft-translte: Fix translation of ICMP type "any" match.- Update to release 1.8.5 * IDLETIMER: Add alarm timer option * nft: CT: add translation for NOTRACK - Drop iptables-apply-mktemp-fix.patch (seemingly applied)- Update to release 1.8.4 * Fix for wrong counter format in `ebtables-nft-save -c` output. * Print typical iptables-save comments in arptables- and ebtables-save, too. * xt_owner: add --suppl-groups option * Remove support for /etc/xtables.conf * Restore support for "-4" and "-6" options in rule lines.- Add Conflicts with iptables-nft = 1.6.2 as during the update to iptables 1.8 ip6tables-restore-translate, ip6tables-translate, iptables-restore-translate and iptables-translate were moved from iptables-nft subpackage (now iptables-backend-nft) to the main package. So we need to add a conflict here otherwise we hit file conflicts error during the update.- add missing Provides/Obsoletes for the renamed package iptables-backend-nft (was iptables-nft)- Update to new upstream release 1.8.3 * ebtables: Fix rule listing with counters * ebtables-nft: Support user-defined chain policies - Remove 0001-include-extend-the-headers-conflict-workaround-to-in.patch 0001-include-fix-build-with-kernel-headers-before-4.2.patch (upstreamed)- Add 0001-include-fix-build-with-kernel-headers-before-4.2.patch, 0001-include-extend-the-headers-conflict-workaround-to-in.patch to fix build with older linux-glibc-devel. [boo#1132821]- Add iptables-1.8.2-dont_read_garbage.patch that fixes a situation where 'iptables -L' reads garbage from the struct as the kernel never filled it in the bugged case. This can lead to issues like mapping a few TiB of memory [bsc#1106751].- Update to new upstream release 1.8.2 * Fix incorrect handling of various targets and options in iptables-nft,ebtables-nft,arptables-nft.- Update to new upstream release 1.8.1 * New cgroup match revision with reduced memory footprint- note build-time dependency on libnftnl >= 1.1.1- Add missing update-alternatives dependency to Requires(post) section. If this is missing the package fails to install properly when it is used as build dependency.- Update to new upstream release 1.8.0 and snapshot 1.8.0.g75 * The ipv6 "srh" match can now match previous/next/last sid * CONNMARK target now supports bit-shifting for restore,set and save-mark. * DNAT now supports shifted portmap ranges. * iptables now comes in two backends: legacy and nft.- Use %license instead of %doc [bsc#1082318]- Fix ethertypes ownership, should be %exclude, not %ghost.- Resolve conflict with ebtables and obtain ethertypes from new netcfg minor version. FATE#320520- Update to new upstream release 1.6.2 * add support for the "srh" match * add randomize-full for the "MASQUERADE" target * add rate match mode to the "hashlimit" match- Add iptables-batch-lock.patch: Fix a locking issue of iptables-batch which can cause it to spuriously fail when other programs modify the iptables rules in parallel (bnc#1045130). This can especially affect SuSEfirewall2 during startup.- Update to new upstream release 1.6.1 * add support for hashlimit rev 2 for higher pps rates * add support for cgroup2 path matching * translation program for nft- Update to final release 1.6.0 * Only a build fix, no new significant changes.- Update to new snapshot v1.4.21-367-g9763347 [1.6.0~] * -m ah/esp/rt: restore matching "any SPI id" by default (they unexpectedly defaulted to --spi 0 rather than --spi ALL) * -m cgroup: new module * -m dst: make ! --dst-len work * -m ipcomp: new module * -m socket: add --restore-skmark option * -j CT: add support for new zone options * -j REJECT: add missing ICMPv6 codes * -j TEE: make it possible to delete rules with -D ... -j * -j SNAT/DNAT: add randomize-full support/sbin/ldconfig/sbin/ldconfigmourvedre 16179572581.8.7-1.11.8.7-1.1libipq.so.0libipq.so.0.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP3:GA/standard/72499241369ed9e387d77110c1a200d9-iptablescpioxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=35e1bbdd4c074994e674854f933f0b51b91082b3, strippedPRR˒o'{L0utf-8bb1bd7eb10e616d7bc92414a65228c2532491e993502a0ac880279e340e6b341?7zXZ !t/ ] cr$x#Z[7MZZtK-,YM\^mrȆS̮t"[ct]4s)JVHhvrnz h> oٴ*$m [D*Xzj% N9((l\@FlP1 SBq! /Veh1%Z$ⰷ )jmk蠴h_ow3xPIӤ=鷯hю RK+q 4OzFg?5[_3\~*zݽ񄯓1Rtl@WO޽ 㙴EVJ}k9UG|M-G ;uFF>IUqת+O[6D! >Z%i =&N{cvfphe,q0HHZI"sIuRo'6/oT9 /d/B^w6x2i1bwH!Fa.4!w73 a`KAŁA^RDI$Ş ABBs`(7 7|pR@dʜa}M"fY5i*xٷؔNnl%~P:-a@heBSVtJM! ԇY]Nǵe^ `nc7IWS7!"hiEUTn8dzFV$ɦ{;ݢgq490"77%:_} x3IhqŖ 4MO"EfZ?t+JX8][8EkǹF[j(q^G&]#_nOS>Ekd XNUg?)(es.< My ΕmC;¢?]Ա{\ f&0F & =#0{EP*ˀ7箠ݛ8e ?G7JYV$~C`Y֚@:\R|H'ul+|2$w4e(Zj˟g;s!%xrK..Ώ}hF#ӼVaW/0g m?Ը QIR TNqדpNnLLM@^/Brp(d(Ȕ˾ϟإgJ4;C¼1~]b1|XHB 7XbB9uy&n7?v6PDYŁrg\UNق\sSkqx;}gc"GE"(յ눷mHPdU6?yԥNG]_SHJeo|mj N,="~)\Nލsl\^OˊC<0`Y3mhag]!wB!fpA5R3nrL8bevjA;u6Rf;l'2[B$-/uXk]2lQŒRij4谸6 J'm PC=LMo {T~w[,ΘW-Eo<$SzДiZAmr A2[ CNת~rZT-t@XpBҢC뷖| .[񄪡tBWA+(7w_*uzDrsfG4-[Tf+FSk<>bARm^WuڂZjZX:!MC0deKZ)LA /ʯU5Ba.9G@ 9P"w*Sa<ݍ.sqf*Bݹ i|7a2=4h3+ʓʹPl̾܎;KE`@8 Ǔ/J k*zGc+BcX:8TS}ӼBP)\ rC"{c&y ΰ*/OB?anDE lm46ԫ\)jCIf D-ƿcPu|;eDyC1T{FOʅGDsKe;{K`uEEm3[FlhLjצ~^Sķ,DImx;x/v˽xMTt:G=k'>!%N&~3bh-*bn'/1C><~^4zB*:3oz!;"foWE{8uQAOO?E62C֓0tu2쪤* ەk)|FEH6㪝Cӥ{9俵C<-֑vхSd~G1*iݍ/XDA3rDx_= `-Ln YZ