libsemanage1-3.1-150400.3.4.2<>,C̉f*ucp9|@i`EFB޼I{_&C}QMS%yۙl8yp/x>j0Yֺ/`}ݤSC3Ӹ&&S ~NL]*$qvcRգ2u*z+ڂfnEM f쩼vf=a:V7(ǂy-!DjGXp58e_@1lߤ3jz齵`%?8@ nG7WfA5>C$?$d  B>P fw    p t(]8d9: > @ F!G!H!,I!<X!@Y!X\!]!^!b!c"d#(e#-f#0l#2u#Dv#Tw#x$ y$z$h$x$|$$$$$Clibsemanage13.1150400.3.4.2SELinux policy management librarylibsemanage is the policy management library. Using libsepol and libselinux to interact with the SELinux system, it also calls helper programs for loading policy and for checking whether the file_contexts configuration is valid. (Security-enhanced Linux is a feature of the kernel and some utilities that implement mandatory access control policies, such as Type Enforcement, Role-based Access Control and Multi-Level Security.)f*ucs390zp37uSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://github.com/SELinuxProject/selinux/wiki/Releaseslinuxs390x lA큤Af*u_f*u_f*u_f*u_571319fea8fc8a44afd29c93cb65271419fcbcd4d570c8f284268b4e6f9447ad0e0a842d1b2659119b65c86194806b3b7b3766acf5905946c76d6b9ddbc97569rootrootrootrootrootrootrootrootlibsemanage-3.1-150400.3.4.2.src.rpmconfig(libsemanage1)libsemanage.so.1()(64bit)libsemanage.so.1(LIBSEMANAGE_1.0)(64bit)libsemanage.so.1(LIBSEMANAGE_1.1)(64bit)libsemanage1libsemanage1(s390-64)@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigconfig(libsemanage1)libaudit.so.1()(64bit)libbz2.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libselinux.so.1()(64bit)libselinux.so.1(LIBSELINUX_1.0)(64bit)libsepol.so.1()(64bit)libsepol.so.1(LIBSEPOL_1.0)(64bit)libsepol.so.1(LIBSEPOL_1.1)(64bit)libsepol.so.1(LIBSEPOL_3.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.1-150400.3.4.23.0.4-14.6.0-14.0-15.2-14.14.3_!d__ @^@^n@^@^@^^F] u@\+@[%@[%@[@Z%Z XN@Ws@W~W-@Wkukuk@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjsegitz@suse.dejsegitz@suse.demliska@suse.czjsegitz@suse.comjengelh@inai.dejsegitz@suse.compmonrealgonzalez@suse.comrgoldwyn@suse.comjsegitz@suse.comdimstar@opensuse.orgjengelh@inai.dejsegitz@novell.comjsegitz@novell.comi@marguerite.su- Add /var/lib/selinux- Remove libsemanage-update-map-file.patch to prevent checkers from declining the submission. Keeping the snippet in the spec file in case we try to enable LTO again- Update to version 3.1 * Improved manpage * fsync final files before rename- Disabled LTO again. This breaks e.g. shadow and also other packages in security:SELinux- Fix build with LTO: [bsc#1133102] * Enable LTO (Link Time Optimization) and build with -ffat-lto-objects * Update map file to include new symbols and remove wildcards - Add libsemanage-update-map-file.patch- Drop suse_path.patch: replace it with a grep/sed logic replacing /usr/libexec in all files with the correct value for all distros (taking into account that openSUSE is in progress of migrating from /usr/lib to /usr/libexec).- Apply suse_path.patch only for older distributions. Newer use libexec- Update to version 3.0 * Add support for DCCP and SCTP protocols * include internal header to use the hidden function prototypes * mark all exported function "extern" * optionally optimize policy on rebuild Refreshed suse_path.patch- Disable LTO due to symbol versioning (boo#1138812).- Update to version 2.9 * Always set errno to 0 before calling getpwent() * Include user name in ROLE_REMOVE audit events * genhomedircon - improve handling large groups * improve semanage_migrate_store import failure * reset umask before creating directories * set selinux policy root around calls to selinux_boolean_sub * use previous seuser when getting the previous name- Use more %make_install.- Adjusted source urls (bsc#1115052)- update to version 2.8 * semanage fcontext -l now also lists home directory entries from file_contexts.homedirs. * libsemanage no longer deletes the tmp directory if there is an error while committing the policy transaction, so that any temporary files can be further inspected for debugging purposes (e.g. to examine a particular line of the generated CIL module). The tmp directory will be deleted upon the next transaction, so no manual removal is needed. * When overriding PREFIX, BINDIR, SBINDIR, SHLIBDIR, LIBEXECDIR, etc., DESTDIR has to be removed from the definition. For example on Arch Linux, SBINDIR="${pkgdir}/usr/bin" was changed to SBINDIR="/usr/bin". * PYSITEDIR has been renamed PYTHONLIBDIR (and its definition changed). - Clened with spec-cleaner- Update to version 2.7. Changes: * IB support * saves linked policy and skips relinking whenever possible- Update to version 2.6. Notable changes: * genhomedircon: do not suppress logging from libsepol * genhomedircon: use userprefix as the role for homedir * Fix bug preventing the installation of base modules * Use pp module name instead of filename when installing module * genhomedircon: remove hardcoded refpolicy strings * genhomedircon: add support for %group syntax * genhomedircon: generate contexts for logins mapped to the default user * Validate and compile file contexts before installing * Swap tcp and udp protocol numbers * genhomedircon: %{USERID} and %{USERNAME} support and code cleanups- Split out the Policy Store Migration tool into libsemanage-store-migrate: it is not a devel tool to start with. Additionally, it causes the -devel package to depend on python, which we want to avoid (libsemanabe being part of the core build cycle). The library suggests libsemanage-store-migrate.- Update RPM groups, trim description, combine filelist entries, ensure pkgconfig() symbols are generated.- Without bug number no submit to SLE 12 SP2 is possible, so to make sle-changelog-checker happy: bsc#988977- Added suse_path.patch to fix path to hll compiler- update version 2.5 * Do not overwrite CFLAGS in test Makefile, from Nicolas Iooss. * Fix uninitialized variable in direct_commit and direct_api * semanage_migrate_store: Load libsepol.so.1 instead of libsepol.so * Store homedir_template and users_extra in policy store * Fix null pointer dereference in semanage_module_key_destroy * Add semanage_module_extract() to extract a module as CIL or HLL * semanage_migrate_store: add -r option for migrating inside chroots * Add file_contexts and seusers to the store * Add policy binary and file_contexts.local to the store * Allow to install compressed modules without a compression extension * Do not copy contexts in semanage_migrate_store * Fix logic in bunzip for uncompressed pp files * Fix fname[] initialization in test_utilities.c * Add remove-hll semanage.conf option to remove HLL files after compilation to CIL * Fix memory leaks when parsing semanage.conf * Change bunzip to use heap instead of stack to prevent segfault on systems with small stack size - changes in 2.4 * Fix Makefile to allow LIBDIR and SHLIBDIR to be set to different directories * Fix bugs found by hardened gcc flags * Add missing manpage links to security_load_policy * Fix failing libsemanage pywrap tests * Fix deprecation warning for bison * Skip policy module relink when only setting booleans * Only try to compile file contexts if they exist * Fix memory leak when setting a custom store path * Add semodule option to set store root path in semanage.conf and the semodule command * Add semanage.conf option to set an alternative root path for policy store * Add support for High Level Language (HLL) to CIL compilers. The HLL compiler path is configurable, but should be placed in /usr/libexec/selinux/hll by default * Create a policy migration script for migrating the policy store from /etc/selinux to /var/lib/selinux * Add python3 support to the migration script * Use libcil to compile modules * Use symbolic versioning to maintain ABI compatibility for old install functions * Add a target-platform option to semanage.conf to control how policies are built * Add API to handle modules and source policies, moving module store to /var/lib/selinux * Only try to compile file contexts if they exist/sbin/ldconfig/sbin/ldconfigs390zp37 17140585953.1-150400.3.4.23.1-150400.3.4.23.1-150400.3.4.2selinuxsemanage.conflibsemanage.so.1selinux/etc//etc/selinux//usr/lib64//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33236/SUSE_SLE-15-SP4_Update/56c236575103dca7ed4afd7ab067618d-libsemanage.SUSE_SLE-15-SP4_Updatedrpmxz5s390x-suse-linuxdirectoryASCII textELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=4469bf0acef9126d2de1bf434f0b4e10fc4fa2b4, strippedPPPPR RR RR R RRRRRRR RRoXu?C(`libsemanage-migrate-storeutf-851e66e7d8020c55e6c39fb5dfb75cad1ce6ac6e35eb6e7650092fc40a9a49733?7zXZ !t/2`;]"k%dWD} 0-ވjfxB݀ 'L!30qAoyr v0>M7DxRREG<33LQ/_yid9uxˑ?= +0fs`_}M5}>:8MOTyOK= k FS hW>s@J 7Alz4ebPUDDϥs*X &+ yʿEy*DWAn"I54>uܿKJ|I,U> l _LՎ8tc4sXp/w4j;LhpͅAFqfgeܞ7@ja(Uw1[^nk K z˿h)jU(x~ASxnwԪ.%8N酯vej]PhИsd#>xS]^kyaԒ$^ .S耹y6OȱJK-]G80끐O#v#EX*f͂:BߎZzĝ {Á{mPHó4OqV%:,)ZӌGHb{W\`,8V{sK=f>'$5.er>-χ?R25̐޾&~n'g+@Ƌ "N t]8{H>bnyjFAǮV ੁ8h-U/0X Т iiUH|~c"g%QѩWlU V˩6i11FD*"oO\\# '{`5n0:F Gq4Uiũ|"nz=lt 4Y0ae(ЅW8W+@]#6EQS\^Q_vsXTĢ7E*aDlƠV˪,B:=]ߗ~ =Eś<rO_{g 9HEw %`}օ4+r):,t1C}s6sY aG'k9.*a:U$۬gj"S C: 7Gpn)f&h[`q05Xfݕ/#@p+􋢄#{8 ;M2GWeniyO'_#Z~ثѲ>H\(S#8j]`:_+X peRBɉhx ~/@ }Z6 A!ì_DFOJ2 & ,*]UymJ ѿnq\fM{rd;`ʽE3׺+;1:)WM3*`gEJdhrMwYi~:rJ*oVILK;щH6HKbf!4TE¯%xޜVyb1li|ICƚ"au& *NJ), W>;e!Pxqr3q/)5ΞM} Y9I>:3 c}IKj1'4 BVOwp_I5`x?!aX @wb""+rs@^NE7Bja&f/@vw)Q35YgԯZBKX6vOЌ YܧQ7A"u]svT-Nإoq7q2Y`8H2d e?#l6q9 wi'NՌmqu%QJՉ$@ȋ|>TR@0!Rz +F׺Ckp~ǷCkFZElad|Tog#أ[`e MXH()"elV^*AZU%)C>򸮍XƊ!3CdՃۥ$aĻ;vl~^'7e$lm/5<']|2 qdo;fzʆaA |7w5u%pz{ ߅֏簘+diHdNhmx|N\XpUW_qD:BBLur72Οr`83 *:%ХdF55k(NLnxw *S9&sFL׻52g3>,#V:hOrA d81<")+pwaZa6>ЋW1*oEB} E{-pº | M*w`""&7na@s(xml]wq.Oi3W~݅;? r3;Ђ,}P2)Y.VTwx"Q#B̍Cǣ3 +T?=MIY1YFE.CCXXT҃sv;fE\b\NR,0X8:t9|I0P4 nc EJ7B.ڬF]mo׆4Qv!y/j7(Rc)<ƛt09ŋT_hV.jFϰ`tpa8=4N5wO<Nƨ,B߄Н&oNmܵlmV*:E;0iko~aVl``KQ& j/}uX G~-0)*k\:GD3&o߯W;r;"7KQHJ@ts;B `ֱ\a^ESŸF+F![sXF %Ӄ75=L:џ6Oݍw~Epz:IgHe( "݃VfJHO!'l" ȨEs^ܐyW z4n7 [X` %-,m2W@F}|>Ԟ!QhQgTdU(>Qa3e{nokI#ƠqҤL%#YNaެׯV0Q.0%cȇj@wC%I?rz߂ߍWRGom٢k aVէM.Q\v=h+m_ap%vlB 85Jt9|>) ۴YV[,QiS]xk,5 ПHdTw~QIڈi1L!$vдi+OVys| #C5qfH 3N:|<8.BJcL)%kƻRfCQ7p쳾^D#s XW`8#JfDŽ7EqC*h &,q2J2AprCUHlKDpŃlmoVI5z%G*ݔFmkR5#g:בYٟ& D.4,N!@Du k4X¸z8J6a(w (-H+/F_0j4P㺫 75\3Ku1 Kg;tjj']>;<c,7&o9K^xP462T\<R'[Mࢗ=6_=T&zh"0r=;|~{uͶ(0Sq!*dK l%lDE.@+ultr|vO̜)R5/PC,hR}p>~j!2@4ŭ5eSsZgZnL FGm E Ӳjp~/ K B뚀E1!ы2wH-}&z+4ţC~??Քͺ7xԤmBIV\O,x& ,ysG'+YEOpjz`@WIn*2;jD阾^Xwsf6p*[s=%=& @R_%I0XrI+T)uNEm4dm&Q YZ