containerd-1.7.17-150000.114.1<>,sfyup9|Txvs .;(ʥ3x*~h)F8@YVj|?3b ӵ3\?pDLܦOuYLŨh.㷬gnTo A6}ЇP7MNy݀)>vU1sr9 >B4o&*C64δZop4V+f'GxX" TF(xtȒ2n\7 33_@啳%9>Ii?id  ! A $+O  $ @ \  b p4\T+(n8xc9c:c=a>a?a@aBaFbGbHbPIbXbYbZc [c,\cL]c^dd be;cedfaeffffilfkufvfwhxi yiD zili|iiiCcontainerd1.7.17150000.114.1Standalone OCI Container DaemonContainerd is a daemon with an API and a command line client, to manage containers on one machine. It uses runC to run containers according to the OCI specification. Containerd has advanced features such as seccomp and user namespace support as well as checkpoint and restore for cloning and live migration of containers.fyuh01-ch3bSUSE Linux Enterprise 15SUSE LLC Apache-2.0https://www.suse.com/System/Managementhttps://containerd.toolslinuxx86_64 if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in containerd.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in containerd.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable containerd.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop containerd.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in containerd.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart containerd.service ) || : fi fi3>O(mE* 3A큤A큤A큤fyufyuaRfyufyufyufyufyufF~fyufF~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-1.7.17-150000.114.1.src.rpmconfig(containerd)containerdcontainerd(x86-64)containerd-gitcontainerd-kubiccri-runtime @@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/shconfig(containerd)coreutilsdiffutilsfillupgreplibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpthread.so.0(GLIBC_2.3.2)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)runc1.7.17-150000.114.13.0.4-14.6.0-14.0-15.2-14.14.1fy_fM@f$e}@e@eem@e;@e)1@eddjdS@d>@d$(@c>@c@cc.c.c@b=b@b@bX b b\@aa]a]aV@```@`y|@`Cn`>`_@_d@^^?@]z@]@\-@\|\Yz\8@\@[0[}P@[ug@[a[Xf@[!@[{@Z@ZJ@ZZ|;Zs@ZC@Z.s@Z@Y@Y@YB@Y@Y^&@Y YtY.Xh@XXXX @XzXWX6@X6@XI@XI@Ww@W@WW@W@W@W@W@W@WgWc@W'A@W#LWV@V@dcermak@suse.comasarai@suse.comeyadlorenzo@gmail.comdimstar@opensuse.orgdcermak@suse.comdanish.prakash@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.compriyanka.saggu@suse.comasarai@suse.commeissner@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comdmueller@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comdcermak@suse.comasarai@suse.comasarai@suse.combwiedemann@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comsgrunert@suse.comasarai@suse.comsgrunert@suse.comclee@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comdcassany@suse.comasarai@suse.comjmassaguerpla@suse.comfcastelli@suse.comrbrown@suse.comrbrown@suse.comro@suse.dedimstar@opensuse.orgasarai@suse.comrbrown@suse.comasarai@suse.comasarai@suse.comasarai@suse.comasarai@suse.comthipp@suse.dejmassaguerpla@suse.comjmassaguerpla@suse.comjengelh@inai.dejmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comasarai@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comjmassaguerpla@suse.comcbrauner@suse.comcbrauner@suse.deasarai@suse.comasarai@suse.comasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.deasarai@suse.de- Revert noarch for devel subpackage Switching to noarch causes issues on SLES maintenance updates, reverting it fixes our image builds- Update to containerd v1.7.17. Upstream release notes: - Switch back to using tar_scm service. Aside from obs_scm using more bandwidth and storage than a locally-compressed tar.xz, it seems there's some weird issue with paths in obscpio that break our SLE-12-only patch. - Rebase patches: * 0001-BUILD-SLE12-revert-btrfs-depend-on-kernel-UAPI-inste.patch - Update to containerd v1.7.16. Upstream release notes: CVE-2023-45288 bsc#1221400- Use obs_scm service instead of tar_scm - Removed patch 0002-shim-Create-pid-file-with-0644-permissions.patch (merged upstream at ) - Update to containerd v1.7.15. Upstream release notes: - Update to containerd v1.7.14. Upstream release notes: - Update to containerd v1.7.13. Upstream release notes: - Update to containerd v1.7.12. Upstream release notes: - Update to containerd v1.7.11. Upstream release notes: GHSA-jq35-85cj-fj4p bsc#1224323- Use %patch -P N instead of deprecated %patchN.- Enable manpage generation - Make devel package noarch - adjust rpmlint filters- Add patch for bsc#1217952: + 0002-shim-Create-pid-file-with-0644-permissions.patch- Update to containerd v1.7.10. Upstream release notes: - Rebase patches: * 0001-BUILD-SLE12-revert-btrfs-depend-on-kernel-UAPI-inste.patch- Update to containerd v1.7.8. Upstream release notes: bsc#1200528 - Rebase patches: * 0001-BUILD-SLE12-revert-btrfs-depend-on-kernel-UAPI-inste.patch- Update to containerd v1.7.7. Upstream release notes: - Add patch to fix build on SLE-12: + 0001-BUILD-SLE12-revert-btrfs-depend-on-kernel-UAPI-inste.patch- Update to containerd v1.7.6 for Docker v24.0.6-ce. Upstream release notes: bsc#1215323- Add `Provides: cri-runtime` to use containerd as container runtime in Factory Kubernetes packages- Update to containerd v1.6.21 for Docker v23.0.6-ce. Upstream release notes: bsc#1211578 - Require a minimum Go version explicitly rather than using golang(API). Fixes the change for bsc#1210298.[ This was only released in SLE. ] - unversion to golang requires to always use the current default go. (bsc#1210298)- Update to containerd v1.6.20 for Docker v23.0.4-ce. Upstream release notes: - Update to containerd v1.6.19 for Docker v23.0.2-ce. Upstream release notes: Includes fixes for: - CVE-2023-25153 bsc#1208423 - CVE-2023-25173 bsc#1208426- Re-build containerd to use updated golang-packaging. jsc#1342- Update to containerd v1.6.16 for Docker v23.0.1-ce. Upstream release notes: - Update to containerd v1.6.12 to fix CVE-2022-23471 bsc#1206235. Upstream release notes: - Update to containerd v1.6.11. Upstream release notes: - Update to containerd v1.6.9 for Docker v20.10.21-ce. Also includes a fix for CVE-2022-27191. boo#1206065 bsc#1197284 Upstream release notes: - add devel subpackage, which is needed by open-vm-tools- Update to containerd v1.6.6 to fix CVE-2022-31030 and meet the requirements of Docker v20.10.17-ce. bsc#1200145 - Remove upstreamed patches: - bsc1200145-Limit-the-response-size-of-ExecSync.patch[ This patch was only released in SLES and Leap. ] - Backport patch to fix GHSA-5ffw-gxpp-mxpf CVE-2022-31030. bsc#1200145 + bsc1200145-Limit-the-response-size-of-ExecSync.patch- Update to containerd v1.5.12. Upstream release notes: - Update to containerd v1.5.11 to fix CVE-2022-24769. bsc#1197517- Update to containerd v1.4.13 to fix CVE-2022-23648. bsc#1196441 - Remove upstreamed patch: - CVE-2022-23648.patch[ This patch was only released in SLES and Leap. ] - Add patch for CVE-2022-23648. bsc#1196441 + CVE-2022-23648.patch- Update to containerd v1.4.12 for Docker 20.10.11-ce. bsc#1192814 bsc#1193273 CVE-2021-41190- Update to containerd v1.4.11, to fix CVE-2021-41103. bsc#1191355 - Switch to Go 1.16.x compiler, in line with upstream.- Update to containerd v1.4.11, to fix CVE-2021-41103 bsc#1191121. bsc#1191355 - Switch to Go 1.16.x compiler, in line with upstream.- Install systemd service file as well (fixes bsc#1190826)- Update to containerd v1.4.8, to fix CVE-2021-32760. bsc#1188282 - Remove upstreamed patches: - bsc1188282-use-chmod-path-for-checking-symlink.patch[ This patch was only released in SLES and Leap. ] - Add patch for GHSA-c72p-9xmj-rx3w. CVE-2021-32760 bsc#1188282 + bsc1188282-use-chmod-path-for-checking-symlink.patch- Build with go1.15 for reproducible build results (boo#1102408)- Drop long-since upstreamed patch, originally needed to fix i386 builds on SLES: - 0001-makefile-remove-emoji.patch- Update to containerd v1.4.4, to fix CVE-2021-21334.- Update to handle the docker-runc removal, and drop the -kubic flavour. bsc#1181677 bsc#1181749- Update to containerd v1.4.3, which is needed for Docker v20.10.2-ce. bsc#1181594 - Install the containerd-shim* binaries and stop creating docker-containerd-shim because that isn't used by Docker anymore. bsc#1183024- Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and fixes CVE-2020-15257. bsc#1178969 bsc#1180243- Update to containerd v1.3.7, which is required for Docker 19.03.13-ce. boo#1176708 bsc#1177598 CVE-2020-15157 - Refresh patches: * 0001-makefile-remove-emoji.patch- Use Go 1.13 for build.- Update to containerd v1.2.13, which is required for Docker 19.03.11-ce. bsc#1172377- Update to containerd v1.2.10, which is required for Docker 19.03.3-ce. bsc#1153367 bsc#1157330- Update to containerd v1.2.6, which is required for Docker v18.09.7-ce. bsc#1139649 - Remove containerd-test (it's not useful for actual testing).- Update to containerd v1.2.5, which is required for v18.09.5-ce. bsc#1128376 boo#1134068 https://github.com/containerd/containerd/releases/tag/v1.2.5- Update containerd to v1.2.4 * cri: Set /etc/hostname * cri: Fix env performance issue * runc updated to 6635b4f0c6af3810594d2770f662f34ddc15b40d to solve bsc#1121967 CVE-2019-5736 * cri updated to da0c016c830b2ea97fd1d737c49a568a816bf964 * Windows: NewDirectIOFromFIFOSet * Changelogs from previous versions also included in this update: https://github.com/containerd/containerd/releases/tag/v1.2.3- Update to containerd v1.2.2, which is required for Docker v18.09.1-ce. bsc#1124308 * Fix rare deadlock on FIFO creation with timeout * Fix a bug that a container can't be stopped or inspected when its corresponding image is deleted * Fix a bug that the cri plugin handles containerd events outside of k8s.io namespace more changes at: https://github.com/containerd/containerd/releases/tag/v1.2.2 Changelogs from previous versions also included in this update: https://github.com/containerd/containerd/releases/tag/v1.2.1 https://github.com/containerd/containerd/releases/tag/v1.2.0 https://github.com/containerd/containerd/releases/tag/v1.1.4 https://github.com/containerd/containerd/releases/tag/v1.1.3 - Remove required_dockerrunc commit pinning, as it just lead to issues. - Remove upstreamed patches. - 0001-docs-man-rename-config.toml-5-to-be-more-descriptive.patch- Disable leap based builds for kubic flavor. bsc#1121412- Update go requirements to >= go1.10 to fix * bsc#1118897 CVE-2018-16873 go#29230 cmd/go: remote command execution during "go get -u" * bsc#1118898 CVE-2018-16874 go#29231 cmd/go: directory traversal in "go get" via curly braces in import paths * bsc#1118899 CVE-2018-16875 go#29233 crypto/x509: CPU denial of service- Add backport of https://github.com/containerd/containerd/pull/2764, which is required for us to build containerd on i586 SLE-12 (where /bin/sh doesn't like emoji in shell scripts). bsc#1102522 bsc#1113313 + 0001-makefile-remove-emoji.patch- Upgrade to containerd v1.1.2, which is required for Docker v18.06.1-ce. bsc#1102522- Merge -kubic packages back into the main Virtualization:containers packages. This is done using _multibuild to add a "kubic" flavour, which is then used to conditionally compile patches and other kubic-specific features. bsc#1105000- Enable seccomp support on SLE12, since libseccomp is now a new enough vintage to work with Docker and containerd. fate#325877- Update to containerd v1.1.1, which is the required version for the Docker v18.06.0-ce upgrade. bsc#1102522 - Add backport of https://github.com/containerd/containerd/pull/2534 to make the man page no longer pollute the global namespace. + 0001-docs-man-rename-config.toml-5-to-be-more-descriptive.patch - Remove the following patch since it has already been merged upstream. - bsc1065109-0001-makefile-add-support-for-build_flags.patch - Remove systemd-related files and add docker-containerd-* symlinks; this aligns with the upstream defaults where dockerd will execute docker-containerd. Version upgrades of docker are expected to work more smoothly as much of the upgrade logic is implemented in dockerd. - Add containerd-rpmlintrc (or containerd-kubic-rpmlintrc) to deal with /usr/src/containerd/* rpmlint errors (which don't affect normal users of this package).- Make use of %license macro- Remove 'go test' from %check section, as it has only ever caused us problems and hasn't (as far as I remember) ever caught a release-blocking issue. Smoke testing has been far more useful. boo#1095817- Review obsoletes tag to fix bsc#1080978- Put containerd under the podruntime slice. This the recommended deployment to allow fine resource control on Kubernetes. bsc#1086185- Add ${version} to equivalent non-kubic package provides- Add Provides for equivalent non-kubic packages- do not build on s390, only on s390x (no go on s390)- Fix build with RPM 4.14: exclude is not meant for files to NOT be packaged, but should only be used if the files are to be excluded from a glob when they end up in a different package. Rather remove the unwanted files in the install section.- Update to containerd@06b9cb35161009dcb7123345749fef02f7cea8e0, which is requried by Docker 17.09.1_ce.- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Set --start-timeout=2m by default to match upstream. bsc#1064926- Use the upstream makefile so that Docker can get the commit ID in `docker info`. This also will avoid possible future warnings being spit out like bsc#1065109 and boo#1053532. - Backport https://github.com/containerd/containerd/pull/1686, which is required for the above fix. bsc#1065109 boo#1053532 + bsc1065109-0001-makefile-add-support-for-build_flags.patch- Update to containerd@3addd840653146c90a254301d6c3a663c7fd6429, which is required by Docker 17.07.0_ce (this commit is effectively v0.2.9 with a few bugfixes missing).- Use -buildmode=pie for tests and binary build. bsc#1048046 bsc#1051429- change dependency to docker-runc- fix golang requirement to 1.7 for the subpackages- fix golang requirement to 1.7- Replace %__-type macro indirections- update containerd to the commit version needed for docker-v17.04.0-ce (bsc#1034053) fix bsc#1032769: containerd spurious messages filling journal- make sure this package is being built with go 1.7- remove the go_arches macro because we are using go1.7 which is available in all archs- Set TasksMax=infinity to make sure runC doesn't start failing randomly.- update to docker 1.13.0 requirement- Update docker to the version used in Docker 1.12.6. This is necessary to fix CVE-2016-9962 (bsc#1012568).- update containerd to the version used in docker 1.12.5 (bsc#1016307). This fixes bsc#1015661- fix runc version fix bsc#1009961- fix version so that it contains a sequence number and zypper does not think is a downgrade- fix bsc#1006368: docker/containerd is broken when installed by SuSE Studio in an appliance: We were missing the Requires(post): %fillup_prereq- update runc requirement to 02f8fa7863dd3f82909a73e2061897828460d52f (see RUNC_COMMIT in Dockerfile)- update to commit 0366d7e which is the one required for docker-1.12.2 (bsc#1004490)- fix go_arches definition: use global instead of define, otherwise it fails to build- Remove GOPATH at the end of the GOPATH assignment cause GOPATH is empty and if we do that, we get the path "" appended, which causes gcc6-go to complain- add go_arches in project configuration: this way, we can use the same spec file but decide in the project configuration if to use gc-go or gcc-go for some archs.- update to v2.3.0 (bsc#995058) - Remove patches which were already merged upstream: * socket-activation-01-vendor.patch * socket-activation-02-daemon.patch * socket-activation-03-ctr.patch- use gcc6-go instead of gcc5-go (bsc#988408) - build ppc64le with gc-go because this version builds with gc-go 1.6- bump git commit id to the one required by docker v1.12.0 - run test during build - only run tests on architectures that provide the go list and got test tools - add aarch64 to go arches- Add containerd-test package which contains the source code and the test. This package will be used to run the integration tests. - Simplify package build and check sections: Instead of symlinking we default to cp -avr. go list gets confused by symlinks hence, we need to copy the source code anyway if we want to run unit tests during package build at some point.* Explicitly state the version dependency for runC, to avoid potential issues with incompatible component versions. These must be updated * each time we do a release*. Unfortunately we cannot create a hard dependency because that would conflict with Docker, and was a mistake on upstream's part. bsc#993847* Set --runtime option specifically to runC. bsc#978260* Update to containerd v0.2.2. (bsc#989566 FATE#320763) * Includes updates to the out-of-tree patches.* Remove MountFlags=slave from containerd.service. This causes many issues with interactions with Docker.* Added /usr/sbin/rccontainerd symlink as per suse-missing-rclink. * Updated socket activation patches to use the same patchset that was merged upstream (https://github.com/docker/containerd/pull/178): * socket-activation-01-vendor.patch * socket-activation-02-daemon.patch * socket-activation-03-ctr.patch * Removed aarch64 that was patched upstream: - fix-aarch64-epoll.patch * Update containerd to 0.2.1. Upstream changelog: * Fixes for cgroup memory updates and process labeling. * Truncate the event log on disk and in memory so that it does not grow forever. This is mainly used for higher levels to receive past events if they miss any.* Use the gc compiler for aarch64 builds. * Add a patch to fix the new aarch64 build support, which has not yet been merged upstream (https://github.com/docker/containerd/pull/195): + fix-aarch64-epoll.patch * Rebase the socket activation patchset which has yet to be merged (https://github.com/docker/containerd/pull/178): * socket-activation-01-vendor.patch * socket-activation-02-daemon.patch * socket-activation-03-ctr.patch * Update to containerd 0.2.0. Changelog: + Add Limit to PidsStats + Add timeout flag for container start times. + Add timeout option for GRPC connection. + Add no_pivot_root support. + Add runtimeArgs to pass to shim * Move epoll syscall to a separate package so we can build on aarch64. * Fix ctr termios restoration isssues. * Several bug fixes. - Remove dependencies on larger packages.* Use socket activation with the containerd-daemon. This requires a not-yet-upstream patchset (https://github.com/docker/containerd/pull/178): + socket-activation-01-vendor.patch + socket-activation-02-daemon.patch + socket-activation-03-ctr.patch * Remove MountFlags=slave since it's not relevant to containerd and might cause issues in the future. * Update to containerd 0.1.0. This required quite a few fixes.* Add initial packaging of containerd 0.0.5. * Add service and sysconfig files. * Separately package the client from the server. * Install to /usr/sbin./bin/sh/bin/sh/bin/sh/bin/shcontainerdcontainerd-kubiccontainerd_2a5e70ch01-ch3b 1719236095 1.7.17-150000.114.11.7.17-150000.114.11.7.17-150000.114.13a4de459a68952ffb703bbe7f2290861a75b6b671.7.170.2.5+gitr569_2a5e70c1.7.17 containerdconfig.tomlcontainerd.servicecontainerdcontainerd-shimcontainerd-shim-runc-v1containerd-shim-runc-v2containerdREADME.mdcontainerdLICENSEcontainerd-config.toml.5.gzcontainerd-config.8.gzcontainerd.8.gz/etc//etc/containerd//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/containerd//usr/share/licenses//usr/share/licenses/containerd//usr/share/man/man5//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:34475/SUSE_SLE-15_Update/0989605f662c44001b29687f50a4c31d-containerd.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxdirectoryASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=ed76b9813f1cff9f45d4dd2ead8b00b66e2624a8, for GNU/Linux 3.2.0, strippedELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, strippedC source, ASCII text, with very long linestroff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RR R RRR RRR R 4fR9b8}Putf-864662f04a8ca53a910f6bbdb6d98098cdf24009b2f514ac82017828d416438e5?p7zXZ !t/]"k%u#u-=!1R- "GX/%cd~`L2UDL zs @gYXCu'yd63>3ݸt\QKgf!R4sh0MTVnZ[A(BC#uFͱIײ %aZ*f>HTԊ3iɤTG3ɥt6OKU [DknMZ@_>Oċ:&5q͋h2GD⠔Aʌbb*TS0@{3=)T }hz۔mqFgZbcF)-ۺ]8pW:t!m-HgV/+x%ɜ2t$NK zv"ӬIx3֩s!&V|&&)?yTDi wEE@{?M* ^kŕϬ8`siPܛ ۟Vwne\ g`\B䎻!$#He%7(奁G0wNH!8/@w-fmEpnJ;|*t"qJe8]`6fN쑈/.iܩFݼ?L%p^J&\dΑ^2GJC5k] X4G 'SZA YZ