libsepol-utils-3.1-150400.1.70 >  A bvp9|_QsŶ9NHQk w{o9-w2qӨD8^?} dl7/]3lӶ}5:*-z7|UCd/x)l:J p{yL.k`wa0D]{6ELJJ&/<8 jKcnŘ;7h#* ` '-9ó=vm%ay1]Nd1bf51a47673731311b8ed370b66fffc68b233cc530f4eb99ec1c487532867e35c05123cb373570e0a4fdd30dd421a02375fc1e24=܉bvp9|ҹBUd'$lLVx2k6pe_6USs|;׭D>5PqLf9c#ZNv9D}ٓ@}W ׂT&ml>y>ǹLF~Ar~k/hBl>תi]>,U`@Dɟ_HʇZ3sǠAaMH*Gt?[Qp`V.e  xj(m]EmWb֛5J9 7haRBK&Hb5Lj>p># ?#d ! Jpt .4<P Z d x   ,@hU(u8|9:FGHIXY\ ]4^ubc Ud e f l u v w"xx"y"z""""# Clibsepol-utils3.1150400.1.70SELinux binary policy manipulation toolslibsepol provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies such as customizing policy boolean settings.bvױibs-power9-10gSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Basehttps://github.com/SELinuxProject/selinux/wiki/Releaseslinuxppc64lev:g큤bvׯbvׯbvׯbvׯbvׯb166cf2fe6e399427c245caa29b8f94fe055a40463ff0df671c24c512d8b94ed70f72868bf9f9a0c2c02627b2226a5cd96f3ba693bf0646811ddf19b49d85e813713628c42da6fe7f226578a042aeefc340b3d15c1e991119bbf6acbffe9d32a5b68e2eababb82bf1882860a966d2661a00283e1f8587aff0163257daf50d157e1d6d6b28561d88e2d6dd3028107c58007f0f05a2c5d747675d525c73b9c1614rootrootrootrootrootrootrootrootrootrootlibsepol-3.1-150400.1.70.src.rpmlibsepol-utilslibsepol-utils(ppc-64)@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libsepol.so.1()(64bit)libsepol.so.1(LIBSEPOL_1.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3_ @^@^^F^2@] u@\+@[%@[%@[$@Z@Z W@W~W~W~W{@jsegitz@suse.commliska@suse.czjsegitz@suse.dejsegitz@suse.demliska@suse.czjsegitz@suse.comjengelh@inai.dejsegitz@suse.comjsegitz@suse.commcepl@suse.comjsegitz@suse.comjengelh@inai.dempluskal@suse.comjsegitz@novell.comjsegitz@novell.comi@marguerite.su- Update to version 3.1 * Add support for new polcap genfs_seclabel_symlinks * Initialize the multiple_decls field of the cil db * Return error when identifier declared as both type and attribute * Write CIL default MLS rules on separate lines * Sort portcon rules consistently * Remove leftovers of cil_mem_error_handler * Drop remove_cil_mem_error_handler.patch, is included- Enable -fcommon in order to fix boo#1160874.- Update to version 3.0 * cil: Allow validatetrans rules to be resolved * cil: Report disabling an optional block only at high verbose levels * cil: do not dereference perm_value_to_cil when it has not been allocated * cil: fix mlsconstrain segfault * Further improve binary policy optimization * Make an unknown permission an error in CIL * Remove cil_mem_error_handler() function pointer * Use LIBSEPOL_3.0 and fix sepol_policydb_optimize symbol mapping * Add a function to optimize kernel policy * Add ebitmap_for_each_set_bit macro Dropped fnocommon.patch as it's included upstream- Add fnocommon.patch to prevent build failures on gcc10 and remove_cil_mem_error_handler.patch to prevent build failures due to leftovers from the removal of cil_mem_error_handler (bsc#1160874)- Disable LTO due to symbol versioning (boo#1138813).- Update to version 2.9 * Add two new Xen initial SIDs * Check that initial sid indexes are within the valid range * Create policydb_sort_ocontexts() * Eliminate initial sid string definitions in module_to_cil.c * Rename kernel_to_common.c stack functions * add missing ibendport port validity check * destroy the copied va_list * do not call malloc with 0 byte * do not leak memory if list_prepend fails * do not use uninitialized value for low_value * fix endianity in ibpkey range checks * ibpkeys.c: fix printf format string specifiers for subnet_prefix * mark permissive types when loading a binary policy- Use more %make_install.- Adjusted source urls (bsc#1115052)- Update to version 2.8 (bsc#1111732) For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20180524/RELEASE-20180524.txt- Rebase to 2.7 For changes please see https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/20170804/RELEASE-20170804.txt- Update to version 2.6. Notable changes: * Add support for converting extended permissions to CIL * Create user and role caches when building binary policy * Check for too many permissions in classes and commons in CIL * Fix xperm mapping between avrule and avtab * Produce more meaningful error messages for conflicting type rules in CIL * Change which attributes CIL keeps in the binary policy * Warn instead of fail if permission is not resolved * Ignore object_r when adding userrole mappings to policydb * Correctly detect unknown classes in sepol_string_to_security_class * Fix neverallowxperm checking on attributes * Only apply bounds checking to source types in rules * Fix CIL and not add an attribute as a type in the attr_type_map * Fix extended permissions neverallow checking * Fix CIL neverallow and bounds checking * Add support for portcon dccp protocol- Update RPM groups, trim description and combine filelist entries.- Cleanup spec file with spec-cleaner - Make spec file a bit more easy - Ship new supbackage (-tools)- Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977- Adjusted source link- update version 2.5 * Fix unused variable annotations * Fix uninitialized variable in CIL * Validate extended avrules and permissionxs in CIL * Add support in CIL for neverallowx * Fully expand neverallowxperm rules * Add support for unordered classes to CIL * Add neverallow support for ioctl extended permissions * Improve CIL block and macro call recursion detection * Fix CIL uninitialized false positive in cil_binary * Provide error in CIL if classperms are empty * Add userattribute{set} functionality to CIL * fix CIL blockinherit copying segfault and add macro restrictions * fix CIL NULL pointer dereference when copying classpermission/set * Add CIL support for ioctl whitelists * Fix memory leak when destroying avtab * Replace sscanf in module_to_cil * Improve CIL resolution error messages * Fix policydb_read for policy versions < 24 * Added CIL bounds checking and refactored CIL Neverallow checking * Refactored libsepol Neverallow and bounds (hierarchy) checking * Treat types like an attribute in the attr_type_map * Add new ebitmap function named ebitmap_match_any() * switch operations to extended perms * Write auditadm_r and secadm_r roles to base module when writing CIL * Fix module to CIL to only associate declared roleattributes with in-scope types * Don't allow categories/sensitivities inside blocks in CIL * Replace fmemopen() with internal function in libsepol * Verify users prior to evaluating users in cil * Binary modules do not support ioctl rules * Add support for ioctl command whitelisting * Don't use symbol versioning for static object files * Add sepol_module_policydb_to_cil(), sepol_module_package_to_cil(), and sepol_ppfile_to_module_package() * Move secilc out of libsepol * fix building Xen policy with devicetreecon, and add devicetreecon CIL documentation * bool_copy_callback set state on creation * Add device tree ocontext nodes to Xen policy * Widen Xen IOMEM context entries * Fix error path in mls_semantic_level_expand() * Update to latest CIL, includes new name resolution and fixes ordering issues with blockinherit statements, and bug fixes - changes in 2.4 * Remove assumption that SHLIBDIR is ../../ relative to LIBDIR * Fix bugs found by hardened gcc flags * Build CIL into libsepol. libsepol can be built without CIL by setting the DISABLE_CIL flag to 'y' * Add an API function to set target_platform * Report all neverallow violations * Improve check_assertions performance * Allow libsepol C++ static library on deviceibs-power9-10 16519556333.1-150400.1.703.1-150400.1.70chkconchkcon.8.gzgenpolbools.8.gzgenpolusers.8.gzchkcon.8.gz/usr/bin//usr/share/man/man8//usr/share/man/ru/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP4:GA/standard/a816d3dcc0526cb1289f5a71c6abd44a-libsepolcpioxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=36eb6b73a4b22a9661d05b32f3e1dab28a329bf5, for GNU/Linux 3.10.0, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)RRRRm0jߙquutf-8e56e6609b82421c487d7da72d129b97b25ca6a0e5c3a036fb236959695d16a77? 7zXZ !t/s] crv9w (>͆H*@Sִ$b)L_ksHLG]Md]dSB[zoCwT8=SZuHbf+na*;p]F@D;1%J4>lgǢ"ܩ g-$ 79`tC8^}v9ސE7w^,eZI+(;fKÚHr[7rvUt~jHu d*#MhZ}_Skm|UJ 'I%HjXƶoŶgX@I%]_T.zVt"Z_L(GԴ,[>m69/xT !oGيѼ*$L-@tf|: #)M{Q>! Pd.8+d܁8)bίp0#8<=JBxR]mZZVa85 >A4^ا9 s.Q |%03V%8XW@V5Dhȋ s3OeӐá/kģm=Gፚ!QaRlI)tusmUeQPU)92N["T\'P V5Fݴ>=OCOIUT[Šњ{›f [$ٱ'W2‡hM|'^D9VY{;Cw,ɶ4T݇B1Pq'PuFY>Y~{llh3|[Cb0nJҁ&W#y츯>*0+67lj@5̛ʘz)7:tO}י^wv^U0?zV-y Eju $51ȳ{)s2W~.Trf ]vE:',*~OK5@HVD"K9\׮m"@ IȺ:L51EկMa<^ ,KSдEc1ß3ID HAyÇ`WwG9OBĨy!0`eMo?ϙ*ꪉ8Q4h# "'0F zRr^<5 5$?efq[(+,sA,%JMXs֓ʔ/q% 33x }P"<[Sl*L l?iP h@hs~/h>2dwK`naxE44ط=َlэZ(/'Zb)yC:eMI犭m]ItN +\cY7qf#*?lda}/k 0Gȇj9TR1Rȫ2ZVv)9V̴53ELlĹ w5cC3e!U|҂3dGI-${冼s";>l]>3H59ď0X atɎ%ƢwlO 6=>K.kG Ep#1D Wo$!u(95[DrC&20\?5> Ayt}}ѨfGA@DG/~ϋ>X. AI65l_MWBR&<P)p@be?.aPal<0@{TLZ` v~ YGn4K޶F?̴ߗ>Oe=fcMc ˭ ƝTxx` $U3`0,K$RJ{N9Q;@@遜yBk0jE"k٨>sZVHJJra Rd=zdhOMZ緳[?nev͞vD +w?3FMa\'n-dHN ^k]j/jC~&iX\%ܠ6Jه |j:'Y)܉}A_k8>5ʏW0kn}$^A*GBP~͆]^7f~ɹ;L;4s ྤ s:'2ΝA>|= f'ʚ (k˚߬Pp~Ok u_& yFF#?Ry;˟a1}\Sxw .T;xBl#b*OLQUkF%!3v{Yt` zYRccؚ2m>B`s怐2!5Zb qM ~{0P&%27etͨ%0.2p[r)! i"5_Pg]lerAW04K%dcC\;)Tt.-6y!{FJ7;>LiE&/t~K`?;b_[8N9LDoC?z{ШSE;c`t_HuMX*АjXb.~;JP9靏%53o(;t5o J(,/R%eH'/R,_e7L #s^f->@8:C5U!2Q ̬w}uW岰I>^Bo44DU Aɫlt5kPI̱"pRA!TN4O-/|s^\(vqeO *:^nr+p}"=ήBߗIQFd*pRӚCSh0_SRߛ|9rI$nc^|/\ϩoV L\#V[3g;GI\H_\KJbɳ*:U Wd²,}`4:GY)PB tG&^؄wjMXa,w΁/Y M:CϸR'Ưox+6J̲C){sZ|[#%y̰ЉQ[w%*NuDɿo1w cGLW3π Ƞz{ mI^Rʙޕ8<نL%&7ShP.=DNiuu7HJ⁥%[ldqV$ 4d$"G}M}mq nn1@d"ܦ~FN=d>UbiKk8^=@Xl:WSI$~/r?H~:6ŏé)cV3^E0E;^Xg9wĦJwYGx0;!љ3~ѵW+1{ V3@wp55\9!2vo#yWl] p%R *A~50D^$1]xUbվA?99y|'PPan8jNJҥ0>-=j$7%s,))q/o* 9zׄil2wZCqCS&ޕoONgT`"]Ö:F͡ y Ȩ,jc`P#;Bi;~ M5VxK[U:^pxbDqKnj}d[9ZjD!~<<|@DkRSF7BÚVfdV^^+]`ER彥0<@eIC |P\ŀ?{;7sD4Lb ٰ?Jژ&~HI (jו-,Cs`qPFbB>7;ea}CNWF-ȋ4n$t= 1 tƚe+]5weHw^l 6l7kJ wuW\hԣ[JR>=ux_"X]4L>xvy6pV4A]xIh1ZVnLҳ#[9'5ǔՍ{Ϧ[B!Qʃu˼~@+IԇUXvݑMlj*D١kd$A9ن0; * v½=s8۷^ Bl<0Ӓu MB?vі36Eznɨ뤲A1V gbqW9;q2Ҙo$s8|A"̡>FKgkإ h aJͤM[@Ѥ@}6 00\Lʊhh$k%}2ޅFW\ʷHQ$e,>Ш> !-Ж̶ YZ