libbpf0-0.5.0-150400.3.3.1<>,?4c@p9|#HszL ;)|AbI\ϬVkej_S/>Z8-$Dˏ~fr؋T\]2+hO`y u a J@=-Y^5cOD QqkYlt,b{3}v Cu'My_te9@R~w<Qkx|qj|oT^g&QAWcΡt@X?Hd   K  7=DL P T \  Hi(8 9 : >X@gFvGHIXY\]$^@bLcdve{f~luvw,x4y<+zDClibbpf00.5.0150400.3.3.1C library for managing eBPF programs and mapslibbpf is a C library which provides API for managing eBPF programs and maps.c@sheep19SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/Unspecifiedhttps://github.com/libbpf/libbpflinuxx86_64Сc@c@dc8ebc77314cf0ed9a5b7a1648b1b520e6d4859b257bd7f1ec5b852096ecb82blibbpf.so.0.5.0rootrootrootrootlibbpf-0.5.0-150400.3.3.1.src.rpmlibbpf.so.0()(64bit)libbpf.so.0(LIBBPF_0.0.1)(64bit)libbpf.so.0(LIBBPF_0.0.2)(64bit)libbpf.so.0(LIBBPF_0.0.3)(64bit)libbpf.so.0(LIBBPF_0.0.4)(64bit)libbpf.so.0(LIBBPF_0.0.5)(64bit)libbpf.so.0(LIBBPF_0.0.6)(64bit)libbpf.so.0(LIBBPF_0.0.7)(64bit)libbpf.so.0(LIBBPF_0.0.8)(64bit)libbpf.so.0(LIBBPF_0.0.9)(64bit)libbpf.so.0(LIBBPF_0.1.0)(64bit)libbpf.so.0(LIBBPF_0.2.0)(64bit)libbpf.so.0(LIBBPF_0.3.0)(64bit)libbpf.so.0(LIBBPF_0.4.0)(64bit)libbpf.so.0(LIBBPF_0.5.0)(64bit)libbpf0libbpf0(x86-64)@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.22)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.9)(64bit)libelf.so.1()(64bit)libelf.so.1(ELFUTILS_1.0)(64bit)libelf.so.1(ELFUTILS_1.5)(64bit)libz.so.1()(64bit)libz.so.1(ZLIB_1.2.3.3)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3cjDaQ@a(a@a@`@^(@^6^r]?shung-hsi.yu@suse.comshung-hsi.yu@suse.commsuchanek@suse.commsuchanek@suse.comgmbr3@opensuse.orgmsuchanek@suse.commrostecki@suse.commrostecki@opensuse.orgtchvatal@suse.commrostecki@opensuse.org- Fix use-after-free in btf_dump_name_dups (boo#1204391 CVE-2022-3534) + libbpf-Fix-use-after-free-in-btf_dump_name_dups.patch - Fix null pointer dereference in find_prog_by_sec_insn() (boo#1204502 CVE-2022-3606) + libbpf-Fix-null-pointer-dereference-in-find_prog_by_.patch- Update to 0.5.0: + New features and user-space APIs: - libbpf_set_strict_mode() allowing to opt-in into backwards incompatible libbpf-1.0 changes. See "Libbpf: the road to 1.0" and "Libbpf 1.0 migration guide" for more details. - streamlined error reporting for low-level APIs, high-level error-returning APIs, and pointer-returning APIs (as a libbpf-1.0 opt-in); - "Light" BPF skeleton support; - BPF_PROG_TYPE_SYSCALL support; - BPF perf link support for kprobe, uprobe, tracepoint, and perf_event BPF programs; - BPF cookie support for kprobe, uprobe, tracepoint, and perf_event BPF programs through bpf_program__attach_[ku]probe_opts() APIs; - allow to specify ref_ctr_off for USDT semaphores through bpf_program__attach_uprobe_opts() API; - btf_custom_path support in bpf_object_open_opts, allowing to specify custom BTF for CO-RE relocations; - sk_reuseport/migrate program type support; - btf_dump__dump_type_data() API, allowing to dump binary data according to BTF type description; - btf__load_into_kernel() and btf__load_from_kernel_by_id(), and split BTF variants of them; - btf__load_vmlinux_btf() and btf__load_module_btf() APIs; - bpf_map__initial_value() API to get initial value of mmap-ed BPF maps; - bpf_map_lookup_and_delete_elem_flags() API. + BPF-side APIs and features: - support for weak typed __ksym externs; - BPF timer helpers: bpf_timer_init(), bpf_timer_set_callback(), bpf_timer_start(), bpf_timer_cancel(); - bpf_get_attach_cookie() helper to get BPF cookie from BPF program side; - bpf_get_func_ip() helper; - bpf_sys_bpf() helper; - bpf_task_pt_regs() helper; - bpf_btf_find_by_name_kind() helper; - usability improvements for bpf_tracing.h when target architecture is missing. + Bug fixes and compatibility improvements: - improve BPF support detection on old Red Hat kernels with backported BPF patches; - improvements for LTO builds with GCC 10+; - pass NLM_F_EXCL when creating TC qdisc; - better support of BPF map reuse on old kernels; - fix the bug resulting in sometimes closing FD 0, which wasn't created and owned by libbpf itself. - Remove patches merged upstream + libdir.patch + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Fix LTO build (bsc#1188749). + libbpf-Fix-build-with-latest-gcc-binutils-with-LTO.patch- Depend on new enough Linux headers.- Create libbpf0-32bit needed by libdwarves1-32bit- libbpf is now a separate project, stop building from the kernel (bsc#1188419 jsc#SLE-17288 jsc#SLE-18805). - Fix LIBSUBDIR + libdir.patch- Add python3 as a build dependency.- Build libbpf from kernel sources, not from github sources, for consistency with bpftool package.- Reflect SUSE CFLAGS - Do not bother with obscpio if we are fetching direct releases - Remove patch 0001-makefile-Fix-install-target.patch seems to build/install without it just fine - Update to 0.0.6: + New features - new extensible bpf_object__open_{file,mem} APIs and DECLARE_LIBBPF_OPTS() macro to go with them - bpf_helpers.h, bpf_endian.h, and bpf_tracing.h are now distributed with libbpf - BPF CO-RE: added field size, field existence, and bitfield relocation support - BPF CO-RE: BPF_CORE_READ(), bpf_core_field_exists(), bpf_core_field_size() and other BPF CO-RE related helpers available through bpf_core_read.h header - bpf_object__open() API now auto-detects program type from its section name - BPF_PROG_TRACING programs support (incuding BTF-typed raw tracepoints, fentry/fexit programs) - mmap() support for BPF global variables - declarative map pinning support added - probe_read_{user,kernel}[_str]() BPF helpers added - bpf_get_link_xdp_info() function to get more XDP information added - a bunch of other AF_XDP changes + Usability improvements - no need for int version SEC('version') = 1; anymore - raw_tp/tp and uprobe/uretprobe section prefixes added - new bpf_program__get_{type,expected_attach_type} getters - preserve error code on program load failure + Fixes - btf_dump padding handling - bpf_object__name() returning name, not path - ELF section handling off-by-one bug fix - mem leak/double free fix in BPF program relocation code- Initial release/sbin/ldconfig/sbin/ldconfigsheep19 16757720630.5.0-150400.3.3.10.5.0-150400.3.3.1libbpf.so.0libbpf.so.0.5.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:27678/SUSE_SLE-15-SP4_Update/503997111c77f37171efa5c2d69e3c97-libbpf.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=96f3004157b1e0e0079d5142bea7eff31e9bab8b, stripped+PPPPPPPPPPPPPPPP P P P P P P P P P PPPRRR RRRR R R RRRR RRI9qJ$p' -<utf-860823b8fe15608a07642232653d5225301d36983280f9276c80b9a6b14d68e9e?7zXZ !t//'q]"k%ne8^ OfM6&I"%ocl[&')}stohaM&wغM !"h )lv uPxUokcts ųD͒$qم0|4Ya9zscH gt%o j>4 Msx/9+aX=ewYTљl9e+@J\iIqF084apso{dWz%K9; &vMsߟXҞ[*scg`nOL'T$,zB+!:,ݕUBL]OeJH^}ӄC?:?{Al YRz0Y ȝ+۽R1/6H)MC/$`t'@ 7c5ióibb3ux3Y#n%ێ+ DYt$@5L]<(T:piơ~k5}){# \gSaN!\MeCbwwIIdN4D=0S% 8f'Dc9J)kз #zn]V=aHa*uQd2Dpf5G$- x@p0{)[G{%ٲ١O2^]KEQcתּ<="B.Ԛ$9S Ih~4u>Lf&)WROu %wy·i֣IAj![0 A`e@]lr@B Y#"o`>t <0tR*k4܁ZiػewMEcSO z-Re/[Ӿn)ꊹ5*#\-e3eۏ7f n3"`IY>q {úgGC?r02@l6Qh1Ob֎:ȠP4bwZTc_mMbemM\qJ.?,}񄺋*W a2E.$1rvBIz%W>\ N%"d3|]8!n:P7&c9yjV?yM'@s`a]vȷQtqC1Bj?-': Ο˄l r5J2+ H~!X1 M;I%E!`MT\aT[ʹGHOҰѣWreV`f7!,8tCV+Rգj7pK7%T4֝z N<#W(RH _P&&W44ʁjȑQnU+cQÏWyeQ(pٱ۟RiͱJg3Z53 +s i9gƲ3o?eB iL V7>3ed߰(8~]n[fi#ނFS_eaLx <3ξ `"e>p*e d`d_BWwM9c[3k# v`%BYZ>Nw+8Flֆ5H^x=olR+D+^"rʠנ)*NA@SslSK9֣uyR)Y򹍃,ŝ:7|[H4袯qB>zqܜ6yRv SLDekwfX=Vs$&P6pb\͟+[hc;l߳#,$N)PmC.0l[Vjk&A6uڬr0#WuVŒ::eocb{t6LaHNP(2)g;>y\ *@vR4N;z7Z@ە_1@>!EQ>cchѠZST\Q$*Znlqv]B]`0_Vm9}KТ9M4)eNMMj)l3 btM17UY6|t, [+=[A CTV]-1ռ=q7` g9[!Ʊ;֌pi&8oP]|´7M r ]-ׅJ߱3-}43eI ]ƙŐ(,tζYr<|s$DzH6WDxZلW >gLp)yG,ɸ0t3N@ua*éW|Шk %D~<ǺW,S5B}lՀ5P2h`,ҐNߑpiPD {GT)Bf.U0@m B Xs^{% 0^a*]wSDz8|(@H8:;1d qV Fu~*ձy:Bfr-}j4_ĬhmVG5,@T{CVA߽,?IX`@^+{¢foP}YXQ~E\6Q돌tJyۼ  2y T+[IV)(#*2aJ*U>L&Of&lMr'zG,-*=W"%6¢n8]E =6ŝ3_n.ec9cج=#맥!T̂9Kdcy^IHf)zAb8sm ow9iͰ28K kҏ7j0ʐwEܢǏ.d{tN?Bq|(,w2;AR<2 %Y7JWq&zkG+Ƥk[O+LSIsz<F{zӷ>b9Omx=+0+ݡNb4Ԁ^<" Mn<5%# ׽0Ӵc}%+r{ -(3Fz7^5pc)bZ}d;_]a?q+fׅa3s|]8ߛD/F"L'8oqda|6FQJЙݏl݃$ºx1f!rEBtiU1e\2N EslNF``jUXHZiNܚz֮@uϺH^ucyiPU+.Y T"?EhB5V$dlF*6H voodX3KshN݌dMS|S Tt4V_:+ϾXaG~s-mF8`g1I@|**U[71/1 ucPhz.%H}Ud &ï.ǵBsLnMTLXGf>g `Ņ_A]~ȩlm|\ъ0g3OSzl;Ly?%<_G}QF5Rv;<]ndMm;)"Qn:2/]˰xO둰sOP*u|S%K*SD~hx8< 4D@ܠpW?"R4Ny䌺 {Ǚ/cɑZO?  T6b4m_@(lP'i3ڀbdGW5>Q:';R!@a"/ H؆ߦ. :06U(/; U|]J[A:KԙBiˁD|̤p3 +=)<e X=>PQAe l' y2fpYt)Q X렝MϬG< RJB<ќlpҖzZ6ِ?՛݉VT $Wq 1X_ۚRN–0];-qq鄜R+d`"k`(/GB!r_cݿ=eMn| e٣yv+hdY>&7Lu4lb>g-e+ e(3Hٜd9jNM(FBY|Y8B_ԾUypPz7PNc!x:]dOnH1"Ϻ͸$ZpB0 kplPy^k@5wl]DenA8!z˝5y9-+uftA`,z]{Ĵ/m 5{Qތ9o?o7qOcCc+0u\ 7gRdʽJ?M"5/FE' )M 7iqL_$NŞ;$a˧N+ T(Ӯ۶7̃ҳGOGk wjEL`zHv~< mxгPթKC%ϩg z1y%κ tn^j`[O;VomwfItNJ^﷒^kW1VSp1Hv4sd>VAIJ?l4顳F4݈EL|,K QA26hVRѣj $ 2 _2W{Ұ cBleomdRi~M!mfYNo=(JwlBɘM@J{\kP`M@LM1P y;*p/׆BzT{@Zr2!1dqS:d30ҽ"ʼ7oeȣ"dSB44xL@1</q1CdU\C f;ɯGJ(T^ ,Q2k q=_Ƶ >QW?jÏ':. >2 9YbPYFb tIs9'iqM5F.wz 'l. ~djM,!h͙K6O]?19m̹+rpe|{|'x;^G YZ