libsepol-devel-2.9-2.el8 >  A _U]-HH! Hl@pLغRR춦zDED.0;/r+S#JObFMTc2gz($QX0Hq ,"}F~ȶ)RwoTUl/b"KSLZAOt{%&p3 LB+,C8"`rSZ5!1(rA˃D?("HI=;oETWu}1PViG`вT{gFف_H:l-pj;9<ҽz=Y)Kv0 //0 t%8?5-PNnj+<Cq7qEUtc{ץ20zeء'c @ d^G VAfY? [eAů0r^+sX~-[ ~jEP [jNRuWLJQZM1F kS涷LI| /ʕcsqoN:<ȧ: l64e1046825bb8fbff35a8c2aec25a31b5ab1b8851ee085eeddeb7526e088d325c4a03a8dcbfbe7c0abaf0909f485c4c44f0cc556@_U]*Wʾ1t2. fpOi'߬ BGCA0s@b']KYw?0>p<?d  ^ " DP7l7 7 H7 $7 7 `7<7O7b7\S({89d:BaG7H7I7XY\7]7^zbdGeLfOlQtl7uH7v$wɰ7xʌ7yhtx~Clibsepol-devel2.92.el8Header files and libraries used to build policy manipulation toolsThe libsepol-devel package contains the libraries and header files needed for developing applications that manipulate binary policies._\ppc64le-02.mbox.centos.orgCentOSCentOSLGPLv2+CentOS Buildsys Unspecifiedhttps://github.com/SELinuxProject/selinux/wikilinuxppc64le SqkC0{}~ xI  We}  hH(ex!N S^ P cA큤A큤A큤_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\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.so.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibsepol-2.9-2.el8.src.rpmlibsepol-devellibsepol-devel(ppc-64)pkgconfig(libsepol)@@    /usr/bin/pkg-configlibsepol(ppc-64)libsepol.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.9-2.el83.0.4-14.6.0-14.0-15.2-14.14.3_@\@[0[Zz@ZZI@Z@Zz@ZfY@YV@Y@Y}@Y{'@Yx@XN@X@WH@W9W~Wk@W,@W'A@W#LW@V@VIVɦV=@UXU@U+S@S @SShRrF@QQ@QQsP @P@P@P@PYPQPw@P@PO0@OD@O[@OtNON@N@N@Nܲ@NNNw.NqN_sNLN6@N/M@M@MM>M>MMQ0@MK}+Ka|@KJJս@JG@JjJS8III2HHHr@H^>HO@H=I@H1kG@G@GƢ@G@G@G[@G@GZ@G]*@GO@G0W@FIFFFvFɂ@FS@Fzh@F$F Eɿ@EE~El$EH@E>@E4E4E@D@D@D@DD@DB@D@DX@DDD|3Dr@DlaDhm@Dc'@D_2DU@D3@D*vD'D#@DDj@C@CCi@CtCtC@CCC@CCǖ@CáC[C @C @CC,C@CqCC+C@C{@CqCp@CoACiCiCf@CbC_oC^@C\CX@CTCTCTCP@COCJWCJWCFc@CECBnCA@C:C3@C1K@C/C)b@C(C%mC@CC CCB2@BB=B=B@BTB`@Bw@B@B@BۙBSB@B@B@BBB@B@BBn-@BlB^[@BIC@BBB9q@B06B-B$Y@BB@B@B LBX@A@AA3A(A%A$@A A@A @AVit Mojzis - 2.9-2Petr Lautrbach - 2.9-1Petr Lautrbach - 2.8-2Petr Lautrbach - 2.8-1Petr Lautrbach - 2.8-0.rc3.1Petr Lautrbach - 2.0-0.rc1.1Petr Lautrbach - 2.7-6Petr Lautrbach - 2.7-5Fedora Release Engineering - 2.7-4Petr Lautrbach - 2.7-3Petr Lautrbach - 2.7-2Petr Lautrbach - 2.7-1Fedora Release Engineering - 2.6-5Florian Weimer - 2.6-4Petr Lautrbach - 2.6-3Fedora Release Engineering - 2.6-2Petr Lautrbach - 2.6-1Fedora Release Engineering - 2.5-11Petr Lautrbach 2.5-10Petr Lautrbach 2.5-9Petr Lautrbach - 2.5-8Petr Lautrbach - 2.5-7Petr Lautrbach - 2.5-6Petr Lautrbach - 2.5-5Petr Lautrbach - 2.5-4Petr Lautrbach - 2.5-3Petr Lautrbach 2.5-2Petr Lautrbach 2.5-1Petr Lautrbach 2.5-0.1.rc1Fedora Release Engineering - 2.4-4Michal Srb - 2.4-3Adam Jackson 2.4-2Petr Lautrbach 2.4-0.1Fedora Release Engineering - 2.3-4Tom Callaway - 2.3-3Fedora Release Engineering - 2.3-2Dan Walsh - 2.3-1Dan Walsh - 2.2-1Fedora Release Engineering - 2.1.9-2Dan Walsh - 2.1.9-1Dan Walsh - 2.1.8-8Dan Walsh - 2.1.8-7Dan Walsh - 2.1.8-6Dan Walsh - 2.1.8-5Dan Walsh - 2.1.8-4Dan Walsh - 2.1.8-3Dan Walsh - 2.1.8-2Dan Walsh - 2.1.8-1Dan Walsh - 2.1.7-4Dan Walsh - 2.1.7-3Fedora Release Engineering - 2.1.7-2Dan Walsh - 2.1.7-1Dan Walsh - 2.1.5-3Dan Walsh - 2.1.5-2Dan Walsh - 2.1.5-1Fedora Release Engineering - 2.1.4-6Dan Walsh - 2.1.4-5Dan Walsh - 2.1.4-4Dan Walsh - 2.1.4-3Dan Walsh - 2.1.4-2Dan Walsh - 2.1.4-1Dan Walsh - 2.1.3-2Dan Walsh - 2.1.3-1Dan Walsh - 2.1.2-3Dan Walsh - 2.1.2-2Dan Walsh - 2.1.2-0Dan Walsh 2.1.1-1Dan Walsh 2.1.0-1Dan Walsh 2.0.45-1Dan Walsh 2.0.44-2Dan Walsh 2.0.44-1Dan Walsh 2.0.43-3Dan Walsh 2.0.43-1Dan Walsh 2.0.42-3Fedora Release Engineering - 2.0.42-2Dan Walsh 2.0.42-1Dan Walsh 2.0.41-3Dan Walsh 2.0.41-2Dan Walsh 2.0.41-1Dan Walsh 2.0.40-1Dan Walsh 2.0.39-1Dan Walsh 2.0.38-1Fedora Release Engineering - 2.0.37-2Dan Walsh 2.0.37-1Dan Walsh 2.0.36-1Dan Walsh 2.0.35-3Fedora Release Engineering - 2.0.35-2Dan Walsh 2.0.34-1Dan Walsh 2.0.33-1Dan Walsh 2.0.32-1Dan Walsh 2.0.31-1Dan Walsh 2.0.30-1Dan Walsh 2.0.29-1Dan Walsh 2.0.28-1Dan Walsh 2.0.26-1Dan Walsh 2.0.25-1Dan Walsh 2.0.23-1Dan Walsh 2.0.21-1Dan Walsh 2.0.20-1Dan Walsh 2.0.19-1Dan Walsh 2.0.18-2Dan Walsh 2.0.18-1Dan Walsh 2.0.16-1Dan Walsh 2.0.15-1Dan Walsh 2.0.14-1Dan Walsh 2.0.11-1Dan Walsh 2.0.10-1Dan Walsh 2.0.9-1Dan Walsh 2.0.7-1Dan Walsh 2.0.6-1Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.3-1Dan Walsh 2.0.2-1Dan Walsh 2.0.1-1Dan Walsh 1.16.0-1Adam Jackson 1.15.3-1Dan Walsh 1.15.3-1Dan Walsh 1.15.2-1Dan Walsh 1.15.1-1Dan Walsh 1.14-1Dan Walsh 1.12.28-1Dan Walsh 1.12.27-1Dan Walsh 1.12.26-1Dan Walsh 1.12.25-3Dan Walsh 1.12.25-2Dan Walsh 1.12.25-1Dan Walsh 1.12.24-1Dan Walsh 1.12.21-1Jesse Keating - 1.12.19-1.1Dan Walsh 1.12.19-1Bill Nottingham 1.12.17-2Dan Walsh 1.12.17-1Dan Walsh 1.12.14-1Dan Walsh 1.12.12-1Dan Walsh 1.12.11-1Dan Walsh 1.12.10-1Steve Grubb 1.12.9Dan Walsh 1.12.9-1Dan Walsh 1.12.6-1Dan Walsh 1.12.5-1Dan Walsh 1.12.4-1Dan Walsh 1.12.3-1Dan Walsh 1.12.2-1Dan Walsh 1.12.1-1Dan Walsh 1.12-2Dan Walsh 1.11.18-2Dan Walsh 1.11.18-1Dan Walsh 1.11.17-1Dan Walsh 1.11.14-2Dan Walsh 1.11.14-1Jesse Keating - 1.11.13-1.1Dan Walsh 1.11.13-1Jesse Keating - 1.11.12-1.1Dan Walsh 1.11.12-1Dan Walsh 1.11.10-1Dan Walsh 1.11.9-1Dan Walsh 1.11.8-1Dan Walsh 1.11.7-1Dan Walsh 1.11.5-1Dan Walsh 1.11.4-1Dan Walsh 1.11.2-2Dan Walsh 1.11.1-2Dan Walsh 1.11.1-1Jesse Keating Dan Walsh 1.10-1Dan Walsh 1.9.42-1Dan Walsh 1.9.41-1Dan Walsh 1.9.40-1Dan Walsh 1.9.39-1Dan Walsh 1.9.38-1Dan Walsh 1.9.37-1Dan Walsh 1.9.36-1Dan Walsh 1.9.35-1Dan Walsh 1.9.34-1Dan Walsh 1.9.33-1Dan Walsh 1.9.32-1Dan Walsh 1.9.30-1Dan Walsh 1.9.26-1Dan Walsh 1.9.25-1Dan Walsh 1.9.23-1Dan Walsh 1.9.21-1Dan Walsh 1.9.19-1Dan Walsh 1.9.18-1Dan Walsh 1.9.17-2Dan Walsh 1.9.17-1Dan Walsh 1.9.14.1-1Dan Walsh 1.9.12-1Dan Walsh 1.9.11-1Dan Walsh 1.9.10-1Dan Walsh 1.9.8-1Dan Walsh 1.9.7-1Dan Walsh 1.9.6-1Dan Walsh 1.9.5-1Dan Walsh 1.9.4-1Dan Walsh 1.9.3-1Dan Walsh 1.9.1-2Dan Walsh 1.9.1-1Dan Walsh 1.7.24-1Dan Walsh 1.7.22-1Dan Walsh 1.7.20-1Dan Walsh 1.7.19-1Dan Walsh 1.7.17-1Dan Walsh 1.7.15-1Dan Walsh 1.7.14-1Dan Walsh 1.7.13-1Dan Walsh 1.7.12-1Dan Walsh 1.7.11-1Dan Walsh 1.7.10-1Dan Walsh 1.7.9-1Dan Walsh 1.7.6-2Dan Walsh 1.7.6-1Dan Walsh 1.7.5-2Dan Walsh 1.7.5-1Dan Walsh 1.7.3-1Dan Walsh 1.7-2Dan Walsh 1.7-1Dan Walsh 1.6-1Dan Walsh 1.5.10-1Dan Walsh 1.5.9-2Dan Walsh 1.5.8-2Dan Walsh 1.5.8-1Dan Walsh 1.5.7-1Dan Walsh 1.5.6-1Dan Walsh 1.5.5-2Dan Walsh 1.5.5-1Dan Walsh 1.5.3-1Dan Walsh 1.5.2-2Dan Walsh 1.5.2-1Dan Walsh 1.4-1Dan Walsh 1.3.8-1Dan Walsh 1.3.7-1Dan Walsh 1.3.6-3Dan Walsh 1.3.6-1Dan Walsh 1.3.5-1Dan Walsh 1.3.2-1Dan Walsh 1.3.1-1Dan Walsh 1.2.1.1-1Dan Walsh 1.2.1-1Dan Walsh 1.1.1-2Dan Walsh 1.1.1-1Colin Walters 1.0-2Colin Walters 1.0-1Dan Walsh 0.4.2-1Bill Nottingham 0.4.1-2Dan Walsh 0.4.1-1Dan Walsh 0.4.1-1Dan Walsh 0.3.1-1- Drop unnecessary telinit (#1838257)- SELinux userspace 2.9 release- Fix RESOURCE_LEAK coverity scan defects- SELinux userspace 2.8 release- SELinux userspace 2.8-rc1 release candidate- SELinux userspace 2.8-rc1 release candidate- Prevent freeing unitialized value in ibendport handling - Add support for the SCTP portcon keyword - Export sepol_polcap_getnum/name functions- cil: Create new keep field for type attribute sets - build: follow standard semantics for DESTDIR and PREFIX - cil: show an error when cil_expr_to_string() fails- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- free ibendport device names- reset pointer after free in cil_strpool_destroy() - cil: Add ability to redeclare types[attributes] - cil: Keep attributes used by generated attributes in neverallow rules - use IN6ADDR_ANY_INIT to initialize IPv6 addresses - fix memory leak in sepol_bool_query() - cil: drop wrong unused attribute - cil: fix -Wwrite-strings warning - cil: __cil_post_db_neverallow_attr_helper() does not use extra_args- Update to upstream release 2017-08-04- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild- Rebuild with binutils fix for ppc64le (#1475636)- Fix neverallow bug when checking conditional policy - Destroy the expanded level when mls_semantic_level_expand() fails - Do not seg fault on sepol_*_key_free(NULL)- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Update to upstream release 2016-10-14- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild- Check for too many permissions in classes and commons in CIL - Fix xperm mapping between avrule and avtab - tests: Fix mispelling of optimization option - Fix unused/uninitialized variables on mac build - Produce more meaningful error messages for conflicting type rules in CIL - make "make test" fail when a CUnit test fails - tests: fix g_b_role_2 test - Change which attributes CIL keeps in the binary policy - Port str_read() from kernel and remove multiple occurances of similar code - Use calloc instead of malloc for all the *_to_val_structs - Fix bugs found by AFL - Fix memory leak in expand.c - Fix invalid read when policy file is corrupt - Fix possible use of uninitialized variables- Warn instead of fail if permission is not resolved - Ignore object_r when adding userrole mappings to policydb- Add missing return to sepol_node_query() - Add missing include- Correctly detect unknown classes in sepol_string_to_security_class - Sort object files for deterministic linking order - Fix neverallowxperm checking on attributes - Remove libsepol.map when cleaning - Add high-level language line marking support to CIL- Change logic of bounds checking to match change in kernel - Fix multiple spelling errors- Only apply bounds checking to source types in rules - Fix CIL and not add an attribute as a type in the attr_type_map- Build policy on systems not supporting DCCP protocol - Fix extended permissions neverallow checking - Fix CIL neverallow and bounds checking - Android.mk: Add -D_GNU_SOURCE to common_cflags- Fix bug in CIL when resetting classes - Add support for portcon dccp protocol- Use fully versioned arch-specific requires- Update to upstream release 2016-02-23- Update to upstream rc1 release 2016-01-07- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild- Improve compatibility with Python 3 SWIG bindings - Resolves: rhbz#1247714- Pass ldflags to make so hardening works- Update to upstream release 2.4- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- fix license handling- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- Update to upstream * Improve error message for name-based transition conflicts. * Revert libsepol: filename_trans: use some better sorting to compare and merge. * Report source file and line information for neverallow failures. * Fix valgrind errors in constraint_expr_eval_reason from Richard Haines. * Add sepol_validate_transition_reason_buffer function from Richard Haines.- Update to upstream - Richard Haines patch V1 Allow constraint denials to be determined. - Add separate role declarations as required by modern checkpolicy.- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild- Update to upstream - filename_trans: use some better sorting to compare and merge - coverity fixes - implement default type policy syntax - Fix memory leak issues found by Klocwork - Add CONTRAINT_NAMES to the kernel- Update to latest patches from eparis/Upstream- Update to latest patches from eparis/Upstream- Fix libsepol.stack messages in audit2allow/audit2why- Update to latest patches from eparis/Upstream- Update Richard Haines patch to show constraint information- Add sepol_compute_av_reason_buffer patch from Richard Haines- Revert patch that was attempting to expand filetrans attributes, but is breaking filetrans rules- Update to upstream * fix neverallow checking on attributes * Move context_copy() after switch block in ocontext_copy_*(). * check for missing initial SID labeling statement. * Add always_check_network policy capability * role_fix_callback skips out-of-scope roles during expansion.- Try new patches- Revert patches- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Update to upstream * reserve policycapability for redhat testing of ptrace child * cosmetic changes to make the source easier to read * prepend instead of append to filename_trans list * Android/MacOS X build support * allocate enough space to hold filename in trans rules- Fix off by one error that is causing file_name transition rules to be expanded- incorrectly on i686 machines- Add support for ptrace_child- Update to upstream * checkpolicy: implement new default labeling behaviors- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild- Update to match eparis pool- Additional fix for default transitioning labeling for semodule- Add Eparis patch for handling of default transition labeling- Allow policy to specify the source of target for generating the default user,role - or mls label for a new target.- Update to upstream * regenerate .pc on VERSION change * Move ebitmap_* functions from mcstrans to libsepol * expand: do filename_trans type comparison on mapped representation-The filename_trans code had a bug where duplicate detection was being done between the unmapped type value of a new rule and the type value of rules already in policy. This meant that duplicates were not being silently dropped and were instead outputting a message that there was a problem. It made things hard because the message WAS using the mapped type to convert to the string representation, so it didn't look like a dup!-Update to upstream * Skip writing role attributes for policy.X and * Indicate when boolean is indeed a tunable. * Separate tunable from boolean during compile. * Write and read TUNABLE flags in related * Copy and check the cond_bool_datum_t.flags during link. * Permanently discard disabled branches of tunables in * Skip tunable identifier and cond_node_t in expansion. * Create a new preserve_tunables flag * Preserve tunables when required by semodule program. * setools expects expand_module_avrules to be an exported * tree: default make target to all not- Add patch to handle preserving tunables- export expand_module_avrules- Update to upstream * Only call role_fix_callback for base.p_roles during expansion. * use mapped role number instead of module role number- Update to upstream * Minor fix to reading policy with filename transition rules- Update to upstream * Release, minor version bump- Update to upstream * Warn if filename_trans rules are dropped by Steve Lawrence.- Fixes for new role_transition class field by Eric Paris.-Update to upstream * Fixes for new role_transition class field by Eric Paris. * Add libsepol support for filename_trans rules by Eric Paris.- re-add Erics patch for filename transitions-Update to upstream * Add new class field in role_transition by Harry Ciao.- Apply Eparis Patch This patch add libsepol support for filename_trans rules. These rules allow on to make labeling decisions for new objects based partially on the last path component. They are stored in a list. If we find that the number of rules grows to an significant size I will likely choose to store these in a hash, both in libsepol and in the kernel. But as long as the number of such rules stays small, this should be good.- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Upgrade to latest from NSA * Fix compliation under GCC 4.6 by Justin Mattock- Fix libsepol.pc file- Resolve specfile problems Resolves: #555835- Upgrade to latest from NSA * Fixed typo in error message from Manoj Srivastava.- Upgrade to latest from NSA * Add pkgconfig file from Eamon Walsh.- Upgrade to latest from NSA * Add support for building Xen policies from Paul Nuzzi.- Upgrade to latest from NSA * Check last offset in the module package against the file size. Reported by Manoj Srivastava for bug filed by Max Kellermann.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- Upgrade to latest from NSA * Add method to check disable dontaudit flag from Christopher Pardy.- Upgrade to latest from NSA * Fix boolean state smashing from Joshua Brindle.- Fix license specification to be LGPL instead of GPL* Wed Feb 18 2009 Dan Walsh 2.0.35-1 - Upgrade to latest from NSA * Fix alias field in module format, caused by boundary format change from Caleb Case.- Upgrade to latest from NSA * Add bounds support from KaiGai Kohei. * Fix invalid aliases bug from Joshua Brindle.- Upgrade to latest from NSA * Revert patch that removed expand_rule.- Upgrade to latest from NSA * Allow require then declare in the source policy from Joshua Brindle.- Upgrade to latest from NSA * Fix mls_semantic_level_expand() to handle a user require w/o MLS information from Stephen Smalley.- Upgrade to latest from NSA * Fix endianness bug in the handling of network node addresses from Stephen Smalley. Only affects big endian platforms. Bug reported by John Weeks of Sun upon policy mismatch between x86 and sparc.- Upgrade to latest from NSA * Merge user and role mapping support from Joshua Brindle.- Upgrade to latest from NSA * Fix mls_level_convert() to gracefully handle an empty user declaration/require from Stephen Smalley. * Belatedly merge test for policy downgrade from Todd Miller.- Upgrade to latest from NSA * Add permissive domain support from Eric Paris.- Upgrade to latest from NSA * Drop unused ->buffer field from struct policy_file. * Add policy_file_init() initalizer for struct policy_file and use it, from Todd C. Miller.- Upgrade to latest from NSA * Accept "Flask" as an alternate identifier string in kernel policies from Stephen Smalley. * Add support for open_perms policy capability from Eric Paris.- Upgrade to latest from NSA * Fix invalid memory allocation in policydb_index_others() from Jason Tang.- Upgrade to latest from NSA * Port of Yuichi Nakamura's tune avtab to reduce memory usage patch from the kernel avtab to libsepol from Stephen Smalley.- Upgrade to latest from NSA * Add support for consuming avrule_blocks during expansion to reduce peak memory usage.- Fixed for spec review- Upgrade to latest from NSA * Added support for policy capabilities from Todd Miller. * Prevent generation of policy.18 with MLS enabled from Todd Miller.- Upgrade to latest from NSA * print module magic number in hex on mismatch, from Todd Miller.- Upgrade to latest from NSA * clarify and reduce neverallow error reporting from Stephen Smalley.- Upgrade to latest from NSA * Reject self aliasing at link time from Stephen Smalley. * Allow handle_unknown in base to be overridden by semanage.conf from Stephen Smalley. * Fixed bug in require checking from Stephen Smalley. * Added user hierarchy checking from Todd Miller.* Pass CFLAGS to CC even on link command, per Dennis Gilmore.- Upgrade to latest from NSA * Merged support for the handle_unknown policydb flag from Eric Paris.- Upgrade to latest from NSA * Moved next_entry and put_entry out-of-line to reduce code size from Ulrich Drepper. * Fixed module_package_read_offsets bug introduced by the prior patch.- Upgrade to latest from NSA * Eliminate unaligned accesses from policy reading code from Stephen Smalley.- Upgrade to latest from NSA * Allow dontaudits to be turned off during policy expansion- Upgrade to latest from NSA * Fix sepol_context_clone to handle a NULL context correctly. This happens for e.g. semanage_fcontext_set_con(sh, fcontext, NULL) to set the file context entry to "<>". - Apply patch from Joshua Brindle to disable dontaudit rules- Upgrade to latest from NSA * Merged error handling patch from Eamon Walsh.- Upgrade to latest from NSA * Merged add boolmap argument to expand_module_avrules() from Chris PeBenito.- Upgrade to latest from NSA * Merged fix from Karl to remap booleans at expand time to avoid holes in the symbol table.- Upgrade to latest from NSA * Merged libsepol segfault fix from Stephen Smalley for when sensitivities are required but not present in the base. * Merged patch to add errcodes.h to libsepol by Karl MacMillan.- Upgrade to latest from NSA * Updated version for stable branch.- Add dist tag and rebuild, fixes 6 to 7 upgrades.- Upgrade to latest from NSA * Merged patch to compile wit -fPIC instead of -fpic from Manoj Srivastava to prevent hitting the global offest table limit. Patch changed to include libselinux and libsemanage in addition to libselinux.- Upgrade to latest from NSA * Merged fix from Karl MacMillan for a segfault when linking non-MLS modules with users in them.- Upgrade to latest from NSA * Merged fix for version comparison that was preventing range transition rules from being written for a version 5 base policy from Darrel Goeddel.- NSA Released version - Same as previous but changed release number- Upgrade to latest from NSA * Build libsepol's static object files with -fpic- Upgrade to latest from NSA * Merged mls user and range_transition support in modules from Darrel Goeddel- Upgrade to latest from NSA * Merged range transition enhancements and user format changes Darrel Goeddel- Fix location of include directory to devel package- Remove invalid Requires- Upgrade to latest from NSA * Merged conditionally expand neverallows patch from Jeremy Mowery. * Merged refactor expander patch from Jeremy Mowery.- Upgrade to latest from NSA * Merged libsepol unit tests from Joshua Brindle. * Merged symtab datum patch from Karl MacMillan. * Merged netfilter contexts support from Chris PeBenito.- Upgrade to latest from NSA * Merged helpful hierarchy check errors patch from Joshua Brindle. * Merged semodule_deps patch from Karl MacMillan. This adds source module names to the avrule decls.- rebuild- Upgrade to latest from NSA * Lindent. * Merged optionals in base take 2 patch set from Joshua Brindle.- bump so it's newer than the FC5 version- Upgrade to latest from NSA * Revert 1.12.16. * Merged cleaner fix for bool_ids overflow from Karl MacMillan, replacing the prior patch. * Merged fixes for several memory leaks in the error paths during policy read from Serge Hallyn.- Upgrade to latest from NSA * Fixed bool_ids overflow bug in cond_node_find and cond_copy_list, based on bug report and suggested fix by Cedric Roux. * Merged sens_copy_callback, check_role_hierarchy_callback, and node_from_record fixes from Serge Hallyn.- Upgrade to latest from NSA * Added sepol_policydb_compat_net() interface for testing whether a policy requires the compatibility support for network checks to be enabled in the kernel.- Upgrade to latest from NSA * Merged patch to initialize sym_val_to_name arrays from Kevin Carr. Reworked to use calloc in the first place, and converted some other malloc/memset pairs to calloc calls.- Upgrade to latest from NSA * Merged patch to revert role/user decl upgrade from Karl MacMillan.- Couple minor spec file clean ups- Upgrade to latest from NSA * Dropped tests from all Makefile target. * Merged fix warnings patch from Karl MacMillan. * Merged libsepol test framework patch from Karl MacMillan.- Upgrade to latest from NSA * Fixed cond_normalize to traverse the entire cond list at link time.- Upgrade to latest from NSA * Merged fix for leak of optional package sections from Ivan Gyurdiev.- Upgrade to latest from NSA * Generalize test for bitmap overflow in ebitmap_set_bit.- Upgrade to latest from NSA * Fixed attr_convert_callback and expand_convert_type_set typemap bug.- Upgrade to latest from NSA * Fixed avrule_block_write num_decls endian bug.- Upgrade to latest from NSA * Fixed sepol_module_package_write buffer overflow bug.- Upgrade to latest from NSA * Updated version for release. * Merged cond_evaluate_expr fix from Serge Hallyn (IBM). * Fixed bug in copy_avrule_list reported by Ivan Gyurdiev. * Merged sepol_policydb_mls_enabled interface and error handling changes from Ivan Gyurdiev.- Rebuild for fc5-head- Upgrade to latest from NSA * Merged node_expand_addr bugfix and node_compare* change from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged nodes, ports: always prepend patch from Ivan Gyurdiev. * Merged bug fix patch from Ivan Gyurdiev. * Added a defined flag to level_datum_t for use by checkpolicy. * Merged nodecon support patch from Ivan Gyurdiev. * Merged cleanups patch from Ivan Gyurdiev.- Fix post install not to fire if /dev/initctr does not exist- Upgrade to latest from NSA * Merged optionals in base patch from Joshua Brindle.- bump again for double-long bug on ppc(64)- Upgrade to latest from NSA * Merged seuser/user_extra support patch from Joshua Brindle. * Merged fix patch from Ivan Gyurdiev.- rebuilt for new gcc4.1 snapshot and glibc changes- Upgrade to latest from NSA * Merged assertion copying bugfix from Joshua Brindle. * Merged sepol_av_to_string patch from Joshua Brindle. * Merged clone record on set_con patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged cond_expr mapping and package section count bug fixes from Joshua Brindle. * Merged improve port/fcontext API patch from Ivan Gyurdiev. * Merged fixes for overflow bugs on 64-bit from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged size_t -> unsigned int patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged 2nd const in APIs patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged const in APIs patch from Ivan Gyurdiev. * Merged compare2 function patch from Ivan Gyurdiev. * Fixed hierarchy checker to only check allow rules.- Upgrade to latest from NSA * Merged further fixes from Russell Coker, specifically: - av_to_string overflow checking - sepol_context_to_string error handling - hierarchy checking memory leak fixes and optimizations - avrule_block_read variable initialization * Marked deprecated code in genbools and genusers.- Upgrade to latest from NSA * Merged bugfix for sepol_port_modify from Russell Coker. * Fixed bug in sepol_iface_modify error path noted by Ivan Gyurdiev. * Merged port ordering patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged patch series from Ivan Gyurdiev. This includes patches to: - support ordering of records in compare function - enable port interfaces - add interfaces for context validity and range checks - add include guards- Add Ivans patch to make ports work- Upgrade to latest from NSA * Fixed mls_range_cpy bug.- rebuilt- Upgrade to latest from NSA- Upgrade to latest from NSA * Dropped handle from user_del_role interface.- Upgrade to latest from NSA * Merged remove defrole from sepol patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged module function and map file cleanup from Ivan Gyurdiev. * Merged MLS and genusers cleanups from Ivan Gyurdiev.- Upgrade to latest from NSA Prepare for removal of booleans* and *.users files. * Cleaned up sepol_genbools to not regenerate the image if there were no changes in the boolean values, including the degenerate case where there are no booleans or booleans.local files. * Cleaned up sepol_genusers to not warn on missing local.users.- Upgrade to latest from NSA * Removed sepol_port_* from libsepol.map, as the port interfaces are not yet stable.- Upgrade to latest from NSA * Merged context destroy cleanup patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged context_to_string interface change patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Added src/dso.h and src/*_internal.h. Added hidden_def for exported symbols used within libsepol. Added hidden for symbols that should not be exported by the wildcards in libsepol.map.- Upgrade to latest from NSA * Merged record interface, record bugfix, and set_roles patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged count specification change from Ivan Gyurdiev.- Upgrade to latest from NSA * Added further checking and error reporting to sepol_module_package_read and _info. * Merged sepol handle passing, DEBUG conversion, and memory leak fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Removed processing of system.users from sepol_genusers and dropped delusers logic. * Removed policydb_destroy from error path of policydb_read, since create/init/destroy/free of policydb is handled by the caller now. * Fixed sepol_module_package_read to handle a failed policydb_read properly. * Merged query/exists and count patches from Ivan Gyurdiev. * Merged fix for pruned types in expand code from Joshua Brindle. * Merged new module package format code from Joshua Brindle.- Upgrade to latest from NSA * Merged context interface cleanup, record conversion code, key passing, and bug fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged users cleanup patch from Ivan Gyurdiev. * Merged user record memory leak fix from Ivan Gyurdiev. * Merged reorganize users patch from Ivan Gyurdiev. - Need to check for /sbin/telinit- Upgrade to latest from NSA * Added check flag to expand_module() to control assertion and hierarchy checking on expansion. * Reworked check_assertions() and hierarchy_check_constraints() to take handles and use callback-based error reporting. * Changed expand_module() to call check_assertions() and hierarchy_check_constraints() prior to returning the expanded policy.- Upgrade to latest from NSA * Changed sepol_module_package_set_file_contexts to copy the file contexts data since it is internally managed. * Added sepol_policy_file_set_handle interface to associate a handle with a policy file. * Added handle argument to policydb_from_image/to_image. * Added sepol_module_package_set_file_contexts interface. * Dropped sepol_module_package_create_file interface. * Reworked policydb_read/write, policydb_from_image/to_image, and sepol_module_package_read/write to use callback-based error reporting system rather than DEBUG.- Upgrade to latest from NSA * Reworked link_packages, link_modules, and expand_module to use callback-based error reporting system rather than error buffering.- Upgrade to latest from NSA * Merged conditional expression mapping fix in the module linking code from Joshua Brindle.- Tell init to reexec itself in post script- Upgrade to latest from NSA * Hid sepol_module_package type definition, and added get interfaces. * Merged new callback-based error reporting system from Ivan Gyurdiev. * Merged support for require blocks inside conditionals from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Fixed use of policydb_from_image/to_image to ensure proper init of policydb. * Isolated policydb internal headers under . These headers should only be used by users of the static libsepol. Created new with new public types and interfaces for shared libsepol. Created new with public types and interfaces moved or wrapped from old module.h, link.h, and expand.h, adjusted for new public types for policydb and policy_file. Added public interfaces to libsepol.map. Some implementation changes visible to users of the static libsepol: 1) policydb_read no longer calls policydb_init. Caller must do so first. 2) policydb_init no longer takes policy_type argument. Caller must set policy_type separately. 3) expand_module automatically enables the global branch. Caller no longer needs to do so. 4) policydb_write uses the policy_type and policyvers from the policydb itself, and sepol_set_policyvers() has been removed.- Upgrade to latest from NSA * Merged function renaming and static cleanup from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged bug fix for check_assertions handling of no assertions from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged iterate patch from Ivan Gyurdiev. * Merged MLS in modules patch from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged pointer typedef elimination patch from Ivan Gyurdiev. * Merged user list function, new mls functions, and bugfix patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged sepol_get_num_roles fix from Karl MacMillan (Tresys).- Upgrade to latest from NSA * Merged bug fix patches from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged boolean record and memory leak fix patches from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged interface record patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged fix for sepol_enable/disable_debug from Ivan Gyurdiev.- Upgrade to latest from NSA * Merged stddef.h patch and debug conversion patch from Ivan Gyurdiev.- Upgrade to latest from NSA * Fixed expand_avtab and expand_cond_av_list to keep separate entries with identical keys but different enabled flags. * Updated version for release.- Upgrade to latest from NSA * Fixed symtab_insert return value for duplicate declarations. * Merged fix for memory error in policy_module_destroy from Jason Tang (Tresys).- Upgrade to latest from NSA * Merged fix for memory leak in sepol_context_to_sid from Jason Tang (Tresys). * Merged fixes for resource leaks on error paths and change to scope_destroy from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged more fixes for resource leaks on error paths from Serge Hallyn (IBM). Bugs found by Coverity.- Upgrade to latest from NSA * Changed to treat all type conflicts as fatal errors. * Merged several error handling fixes from Serge Hallyn (IBM). Bugs found by Coverity.- Upgrade to latest from NSA * Fixed several memory leaks found by valgrind.- Upgrade to latest from NSA * Fixed empty list test in cond_write_av_list. Bug found by Coverity, reported by Serge Hallyn (IBM). * Merged patch to policydb_write to check errors when writing the type->attribute reverse map from Serge Hallyn (IBM). Bug found by Coverity. * Fixed policydb_destroy to properly handle NULL type_attr_map or attr_type_map.- Upgrade to latest from NSA * Fixed empty list test in cond_write_av_list. Bug found by Coverity, reported by Serge Hallyn (IBM). * Merged patch to policydb_write to check errors when writing the type->attribute reverse map from Serge Hallyn (IBM). Bug found by Coverity. * Fixed policydb_destroy to properly handle NULL type_attr_map or attr_type_map.- Upgrade to latest from NSA * Improved memory use by SELinux by both reducing the avtab node size and reducing the number of avtab nodes (by not expanding attributes in TE rules when possible). Added expand_avtab and expand_cond_av_list functions for use by assertion checker, hierarchy checker, compatibility code, and dispol. Added new inline ebitmap operators and converted existing users of ebitmaps to the new operators for greater efficiency. Note: The binary policy format version has been incremented to version 20 as a result of these changes.- Upgrade to latest from NSA * Fixed bug in constraint_node_clone handling of name sets.- Upgrade to latest from NSA * Fix range_trans_clone to map the type values properly.- Upgrade to latest from NSA * Merged patch to move module read/write code from libsemanage to libsepol from Jason Tang (Tresys).- Upgrade to latest from NSA * Enabled further compiler warning flags and fixed them. * Merged user, context, port records patch from Ivan Gyurdiev. * Merged key extract function patch from Ivan Gyurdiev. * Merged mls_context_to_sid bugfix from Ivan Gyurdiev.- Fix MLS Free- Upgrade to latest from NSA * Merged context reorganization, memory leak fixes, port and interface loading, replacements for genusers and genbools, debug traceback, and bugfix patches from Ivan Gyurdiev. * Merged uninitialized variable bugfix from Dan Walsh.- Fix unitialized variable problem- Upgrade to latest from NSA * Merged debug support, policydb conversion functions from Ivan Gyurdiev (Red Hat). * Removed genpolbools and genpolusers utilities. * Merged hierarchy check fix from Joshua Brindle (Tresys).- Upgrade to latest from NSA * Merged header file cleanup and memory leak fix from Ivan Gyurdiev (Red Hat). * Merged genbools debugging message cleanup from Red Hat.- Remove genpolbools and genpoluser- Upgrade to latest from NSA * Merged loadable module support from Tresys Technology.- Upgrade to latest from NSA * Updated version for release.- Fix reset booleans warning message - Upgrade to latest from NSA * License changed to LGPL v2.1, see COPYING.- Upgrade to latest from NSA * Added sepol_genbools_policydb and sepol_genusers_policydb for audit2why.- export sepol_context_to_sid- Upgrade to latest from NSA * Added sepol_ prefix to Flask types to avoid namespace collision with libselinux.- Upgrade to latest from NSA * Added sepol_compute_av_reason() for audit2why.- Upgrade to latest from NSA * Fixed bug in role hierarchy checker.- Fixes found via intel compiler- Update from NSA- Update from NSA- Handle booleans.local- Update to latest from NSA * Added man page for sepol_check_context. * Added man page for sepol_genusers function. * Merged man pages for genpolusers and chkcon from Manoj Srivastava.- Update to latest from NSA- Update to latest from NSA * Cleaned up error handling in sepol_genusers and sepol_genbools.- Update to latest from NSA * Merged sepol_debug and fclose patch from Dan Walsh.- Make sure local_files file pointer is closed - Stop outputing error messages- Update to latest from NSA * Changed sepol_genusers to also use getline and correctly handle EOL.- Update to latest from NSA * Merged endianness and compute_av patches from Darrel Goeddel (TCS). * Merged range_transition support from Darrel Goeddel (TCS). * Added sepol_genusers function.- Update to latest from NSA * Changed relabel Makefile target to use restorecon.- Update to latest from NSA * Merged enhanced MLS support from Darrel Goeddel (TCS).- Update to latest from NSA * Merged build fix patch from Manoj Srivastava.- Update to latest from NSA- Add optargs for build- New version from NSA- Apply Stephen's chkcon patch- New upstream version- Newversion from upstream implementing stringcase compare- ldconfig tweaks- Ignore case of true/false- New version from NSA- Initial version - Created by Stephen Smalley   !"#$%&'()*+,-./012345672.9-2.el82.9-2.el82.9sepolboolean_record.hbooleans.hcilcil.hcontext.hcontext_record.hdebug.herrcodes.hhandle.hibendport_record.hibendports.hibpkey_record.hibpkeys.hiface_record.hinterfaces.hkernel_to_cil.hkernel_to_conf.hmodule.hmodule_to_cil.hnode_record.hnodes.hpolicydbpolicydb.havrule_block.havtab.hconditional.hconstraint.hcontext.hebitmap.hexpand.hflask.hflask_types.hhashtab.hhierarchy.hlink.hmls_types.hmodule.hpolcaps.hpolicydb.hservices.hsidtab.hsymtab.hutil.hport_record.hports.hroles.hsepol.huser_record.husers.hlibsepol.solibsepol.pcsepol_check_context.3.gzsepol_genbools.3.gzsepol_genusers.3.gz/usr/include//usr/include/sepol//usr/include/sepol/cil//usr/include/sepol/policydb//usr/lib64//usr/lib64/pkgconfig//usr/share/man/man3/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power8 -mtune=power8 -funwind-tables -fstack-clash-protectioncpioxz2ppc64le-redhat-linux-gnudirectoryC source, ASCII textpkgconfig filetroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RPRutf-8e16570b801270053fc6058d65fe314b693de0010c9a084f00a93caba595156f2?@7zXZ !#,p] b2u jӫ`(xyߚޞL1 4 (߃'[jI'wlvƒ`7!iGR!Y;*;f!hG#m]әУy,tY޹ ٰ^`sENh.o%"ŭZL‹RT&g΁K?>Ʌc$cR80_+1XQ67e{ l݃KJG3 e=bhBi`kaub(Vw{/)k{wio+q,;zXMBSgb5L^\m YKJWysz[N63s'%zS1FHf,7D$Kkrh?׾@ZkwgԢoz.иӨ#m3fv1业=I36*,!xi]R1Z<~+cDrkCb[hʶ!CriۋK^VT WqX3Q RqP⛆7qct"ˬ;[خs`aJ!WCD_ݘ!@ǺaSS?a8 @臐K8 я"4_}&5DH9&"Tx?*P׭tzES$P5CIDu*P٢Fm;iZUW~ߗ_x`ߋw$khU>v5W %ӷ2ʤlùEeK32Rh]EVk$Qkltdw iXl~ck $rK;]~H_(L"̋cEۑwǛ>RŪeF9G !y Y9wL"QV4CfGg&|"8fI+ܸʒa2Q]p7̻Sc΍&MH",AHDRF!B&VkW7WdN%)"t[X`G7qXX$Yj'ct|7G~x^l~"U SnX/wW/ֲF*T@E8 nܦMK>שLĐ4*$0g2PˁBP؏,FOge _n Q+~/FN./U2 }c#8b[!g,#(.2Aĵm?Q1vV]Ov_ ce8zm,SGQsguipc4ZvV9Єک#]"6G'tpsnDjQ$uC/UAG4Uҙ‹N>7+fbҏUSϥԓqA= ›㾟 *SFo=34N YLiaz㜪fex0נ GE!.8c9&0TX˼0V: 操ȷ7'a y_~cNԠ͹O8Y66Ҁ"/qpam2-W/~"o$ePqRoʄy̕Pgc>z;m˜# ̲vۡ80Jj!J5K%;/ЉRDG@]֩ɕ4 e~X;pr'Æ#+f #GX}*;8JV r'7rBLeQzRˆ3|og&6t]L1Ç^uvaJ=iE3Z D6 Njipv:x8A%jDڸ9(b؁?_?g!)5pQxYcn}Y&m%oWf\[ğ* eߵơx(nOn Hzi3~= h5 zyl,1S!!O0֗ٴ6Uv%iwl:Tg_j&wʓ\&`Z }z]j"OcbTE4D`2:EG bX!ȣx0pƩjh#&=k%ᯁG$w#g*z 2|XLv| ($F)o#5ȏn%Xcy@>[Tx9%8W<Ԓ"*/1}4 s4SYO-z0 wv 7{į3KV~hY3MCj|U3AiYJ@GՌJ`"8lrO#'1tb#v44C4rE6"Gk>*?s$Bz5\+ԨdBމ+;F7Qm}~L)fϘe_sh Yx8ViJ짘,r,oqvfSC$Qx gqcd}{^P"Z]CXGXfdy6vۤC{f}?;Sk7{ 1igdG;/FdV(s$p( GXLz%T>`HUQ_55Ad~G1R4TMb*U.D=者 xgi񡕘andQLΡ? st840Z:S\}E^9fKfyAV;Ӗ[2a. gB@3&c>x?kw1t`/kj4&N ,)"_UmqomsˌcKRR>̘@&.B) 2 cү0YaDT#f8PAG\? F Z[- ~h,5 -@`<$(uW"Y q (V;`$qjBf@<)b346l>j|Tk/UP\^͵u^S /ly>kXyXW] QJQFMúFZ?A06mϡgȕlY:ᲶcA`3eqIZĶܡ$so~$1%yuߙqOۊǁ 9' )' <*]s4aJOj!E/gheƉZpk2'CZd,MՖ]LuK[9 ొ^%?¸AR`YPMM3yk3$GrHH'/9Duy'=νi<4S6pĦuaN jQPBT]UڀmE[U1FG!oq{yrU!ݟ|PcoaoƔ޿w b0eVvH}9f. c,;h)8-X<Y`PsU9G5d}NX`졍s̫-FMC'Rqkk?=3p,~vlDT:-4Aưz,-'Z~LK!Ld֮*,z)4gY5\iJz s+൲ WL=h'kcqNKcmtTq}tY8$CUPolnwǪ.-ܿ|G+Qhx lQ 8Т.s% lP?(R1i@LhDvzP M.O}pßZ͛{ݠ']@H| 4P)*3 E<<;_P6Qc Nd}tmXj4 aM)2;!/FAM=uHwʸ⬲M}:!X%S 4R(3+a=FԥE.̣ѕE|\A8xv% &FW9 Vu/Mt̉SS1)cksU; ژè;އQ_|Zsa#%%W$`YmU%$ !#Υ MgFS0I[nY"EΈiV3H4J\%iÔ=%U}Cຠ1^Id>K`xJ:lZNNCP$Նńv~]W*q߄땐!RZ.@\yN+X?`e9ȕ(+c~S>PAuM-@}!QDs U lf|Z(T-s՗x`ný\5i6`*/l H(B@Bp縄|%)鏜|]BMlzv(jƷ>)!*VvS\{ɐ4,^:]dv sn6j@W$9O|9"IVsnWs5@(rU&@dʦ`HlLl8*hl"֧j|'o漣7a^'܏mv: Kr̶uSK"fr\XH:l=i1Z )YTOp q6Xݭrw,.{!oL;.#*~̿_`nPz׾E4PS>>,HhD6! _>ΪFLId؅\A(  ItSDx/:B?=a4ֶCE'o/.!Y~7ͽ_CJ3|2{kh"sJ'&E1أ $^ëdu >-k8Rŭ#ŽF%PX<|ão (UT9E@auAIxR8:a}]&Ub[ƈVAÞE͸Fz"~h(]cQ.Q6ϙ1weoȈPҴLD1:Xfy&X=(>O*Xe#z[YWPyёvɺoZV" w麥/t2 X_Ş]o؏䥋9!_qkhY*jEZFb9?JSh"!)J`9"m)f*SJ`^BoAtZgji1L{9 9ZBGIL"f _p6U Y;* ]]=4v%&xdj͛Y{j P22ɏbSnʌs1;"F\L}%!Ȯs[wRտTB.vy# ¡eٵͫm_|Qi(0TYxC^:JiӨ^u߷Rr;m_ y% 3H4%#D^?9=M IdhKv+v>|},ŜOMW6?g'M#Ű-]cFun,'D0ϛ5f^ +LŤBqL;L5dU S8oGo?\c E絚wzMu zϿ%dX0[OV<| _  @4Ib֏Wds%즚Fh x]>B#9h;!Z-r۹Z_5RO j< 8Xlc;D*fۚ&`p"#ΓE\`ޅo.ӛ̞[ÆJ1"hlĮ:|p9EJmѬ`cojuoAvQD7 Pj$D5ژP1igxg\YՋ%7[BjFV&V,?,K&Yz/~sha"k rhOebSbĚA up)k} u7iy|5n3wuc٤j4αFO2`0 =k,Nn@]H|~/#[Jk+QINvo4 +lA%Z<3ՅP l09|։*!RznvǗVB*nIBfմ4xDG(H猭~hU׺mu1%+.̅Bt=YfT|M=3sߛX|kG 4ٻXKcDC6q\׻tfP^UlΆUF ,"nN nvU`IE/,a=XMV|vQW߽ވzB8on|/RnjW7d+_dHO;@j;%o8P<T;la9)sr `.r&[2CNڒ!W_"lAǃ*}d(UΚH9BRCiӜf]!Yb? R2LI>"ߥ-[vߝp TD3бKw;raUڹѱ_gmmu9G(Zku8LhM82!glJǨ㘬iH-(z%22 **r "j?bшPrı}#M܈6ܸ;=gtw/y_Er?@|b@D _i:fOoϜcKzdO/7CH'DQ0ԉlO@9 [c D3y5=*ԅ2"i8h{~t#tWGސ)6hx놩DgdX(ʑ-!R+-=ݪsR86}vdS>kcVu>r֎vw8prA0mhg =v W(Ġzu^g %"o#Iobo)<̣U3[)Aw?u@8 ߙF@# Pv CE;NMToN ;op8{aPXA[_pnǧ?{4`lNӟ]lqS/.͓drv؊N~=WǢQ_6PT[c D% O)'W3LDXڋBA,('rzދh*{KnU&Jv# CW[tħٱiJ\S-H|QA")v\ri"~?DǴ}/ԔM0>9C/S4қ I$s\nBxLIfmZ ~Pe%2{sȸ,[U:uF.mdcԥ-ÇՀYS]({fAwZi`=vk@6LB8[&dҼݐ͑)©C]*zC! Nbs78=͘>qRWaE}Ñ%3,xjw"Ic>m]e.'{IIpY;-b5Y߇2'\=^,,9a_y._;#gtai*:R)TmrwIb> $5 pћD@Ӡa gd*#bHovKdԛǎl f @L~}H}v.uNZBopԮ_' 6|wATW1h5wW{8W>8ͩjdDv5:Uף U{ $ƌ@zpZeehn*$V{X"D#iACFpj7P&9R̬T"4,r)lZb'J?`& x @ ͩ#ggE%'*-[5]^oceO3EK#{,B+[E}޲JC0P *4Nk `%ѿS=1gfGnFd' TY4n!qhTJCL~ޔy cG?>/@<ẫe /p<*0q ыp% <,_{>̳KKO #Ak˅"# !Jԝ$en7z;r>gk>Zt"\ݿkw smW. M}cV$A# 8ƙ)?r[-Us ?Lɞ$+ _qmhWugFCN_w'qITtQn uL+Łګ_~퀙ЈW`P![c_o{-~5eľ+)!qIDA ;&~c.\ӄ_7U @ J9S ,Y3D}\0(#hS15eN 33=,]˥|[j>@yڿ$RނiPƲdu:}z$~q8˄NX<|u= s;x۔ z ww!mb\Fo̪f@s!cL9-edWW[aJی_#F#>ORL[HJ!9 /FRz?r<-`8va|kn E) Zpl`Lf%hϽW`'YP_yP*& L;w36 }]vC4;p. F|H|!JKvRVU/"7;# teLwnNpXqOg><1W42^xa1OnH]ӯ&Jߔr&~@PXz7q)b?S]7:$q<%inO!7H:.A|.s'~~UN:|11uE.Le8(SAbϰqYyRM\yэQ|M ]UVd,˔;(]l-@>GL^>tK?!ٛ' %EwXأk)$w*e rTy+A隮-!i)E|tP-`lj߆<:&[9" _//)g>g &(ڸE7~L2IR ĵ/OLAMgB6N#]Kgq(g oIQ4íG$,HZ,Jۖl۬c$V(A+|QNv{Y3l$XQx|:9X{?Zo;Z^ZAa+RNv#G7R4ViդGݼAlj@-1: PxFg t {Sމ"ˁWK VK LZeb9'{l~-dp}U Ƒ.VK d錈*TuP=H ~A 2[ zTNow!(,T {R_\Z u*|zrwUZY&ܗh2fǓIXNBRxLlBrz h,CE/pJNkfo=n1] G}ȫ|[Jjj<ƚ:h5<Ṙ5DsyprMu_H\^g~8 &Yez880ո^")+.&ՌE_sKP=`1R>}wTWYiDǫ ̨ >;9(xk6R{  v(Ȼc]vj~F, &(Lto6XP<08 N8$V)cdb p6Ea"<%oeQ§vE[e#W`n-yqVPBAQ!Q|'u4Lq0#@xEp,%IYuhU϶cXm哅IA u~[mMGfRCF@5jq۹^Wb+cDUri ,"nju '68{nGS`-г0E$&.gRf|7/ɜyI=|񒩈*<6HOH J,[B@qhe | v4F Y@iHK}svyoQ]PmxѶrD-!K \6e-UfԀ߻(yT#?5R8,pj}z@)2*c,@zZ5`f3\m>ڥ%ҷ+ \@Q[0'D +}bj\VL$Y}XnX~p\e3kQ-@NZ #+{ 3qO{J6X$'`.JXƇ/R-Pa IQ󉣋-઴N1,E9 I*m~-ĪUV?P'Px=/'51nY`*V#$\<$0h`a*>{f; qaGwL?=C[]^4NU)M K7sK+K_ !YQѕo 33xoQ`[LFE@@75-Pk e D#gWeuǗ8SwהvqRaƔ\ Qkb\lӚʻSGM5GV!T4 HqI~1z߂Oǟ̭x^( 2^o g6"A'O3Gq>>[62:Tth_#VN(v #&˅ҫ-g&$< (V| hBg )4, Me&M/(|@H Ɨ"еCNѥRL)*w ^`+,@qc~b%(Us73q"(l{84ZAj(`^9 _4ґ#rRjnÐ#Nz`;y8n+3 .:Vj,9;r%'|m$ȗcg%XtmyKPX&Jn7$gɟ WV(3hɅ'2xTyPUTt[|Oa{n?F^WtAaMp1p1vȦ_=>W"(rE'Q5S4ZDl'pBo褬؍m Svzv=C|i]s@ZՐg $#IɰA}0Fr25'sI&iT I)eMZKK0IűfKۥ)v$rdT$4#j94\@&@ּ|?nM6^wEIQU@-PHJO\&l_ݦX(?m0Ds|1c[VsUTNhm˝mT V xSeRװcfjvyhmV2,\F)^C9et$\FҰcvg)@mjn1͆e㖛}=7ff%A ZZ+2dDJ>ofʞk\n(:a[] Xwyfʰǿ~ uF![TZͬ&y;=% {vX/3,YՊ1”]@L̚b}VXAVvHfގ*Gj| ?Ă> }![x-:,5.Cbsױ-B@2ʑ0zE {jg`y! }{\rT,:˕m hi27}1L3Z\_Z;5p/NuQ$;!ܜtjI|$ǧyuW_ᄁ^GXO`Z7~.6'=L@@tFo|OR;߹X `ǣ;ǂ&(UdPy0=q0Pir0e7)Ą1ѱ`A(oQ|O/E+ݕ] B<1bRN RK⃃J с)3ޡvb(1 XG(cIne#Q3;ǽ^3,uj <:x o*l?s>:dy=Li8%FYn{ zf3h եMld+U/{^e /3SM]e'gr[sM1[a޴d5i|v;x ͇TfP}n=FC"s{rMhK.7Ͻ IkiL v ªB1lk m\v\CevNJ.3p:5W+@(,9Ŏ{& "njg4,]Uad)'ndc\l<Aύʬ0`Л$}sgԊx ,:k?a? &8.tUS9" qO鴼73|Io4\Py>MюiʎX˖ɲ5N+qȈx @Wa11 < /j}05^{Lh)]'QUJj*$-9Eݫ2)a@4Y8qfm1 65CPK;nt 7աԷtC/".?DYNOE&ݏ Nws7XGŅWL1I-b2挑t˲s85~!d`Z:Q)n&mJفO渔3#06 'HMw/s[,x+pirТk4KմS᠛,F&t'ŭk.]Lr聇';S7 e);u0t"r#t2U5c@A#.'~c,n}Ra|+_5 E$ oe7vP8V,]1HW&Q"P~k$W^A]$eM6֕~Od\>>W4",E/?haa`MZ"J5͍i3Rt2r/S>!NE,DMJOslM{ Y5 '#Oc#NT0[0]U)פ& sL.]ʴTD Ѿ{|c*z_"{t2#tAp~Tl4uϱiX(V~c䢘Y74𾯬vCe kއS $8QWm!^+7lL|}?.e*%0w~%|[䉊Dskf3ő17}0ŋY aPd3.~5С jbe.G*O".GէtLAE픡I^0Yh:icZ,0z _}^K J!~A_ yEXx^ooccqQXb TIז{ |Zy>Rx`GTVȩ4C$(`?ą4M6^k'jg_x!TRy4+`,^WE5r0н?'}XU*nT5LfGAe}5~׊gRf6I״S|q*@%3Yx *lR3lG9)hz>8Yu[Αm9uoqc+󑲬߄#"?bf*ݜJ4//5fǂjIe߆"vl<$ٍv:G]ɅBޫ[>B8J,VvSVkˮbZklGA4>cxdHFhhK>4uLHPz7drYS q@^2zLgVN|Ɔ7Λ:+9Fmo# U^K2hh8P+E󢬇 dk~$%d\/=PHzQx*I`^u3=-b'49#bs@llE*"ι x}m._}7mW!BIdTvcQ֖Bz,]̳&/eu_&ՁyXB%Q8CiQag ==,5ELrovF.?h fkmq^qFXu]2<fɛtabre :*faLS/RI8OMh6A gXfOTHitN;cx6]`ki/ t[m-?'BxPG0 |M7Q|jn^XX6G޴ntxRF h٥g'mup[O(xY|tlr)9bsY@beˀVYD$U=eCQARD<9B§P}y6wE4T 0#ʕ'fZԱ+a,چ}/}12|PR2 | N 7M H҅/JF)%D^jf`m[%?bř; fY@F|cdf-Ի$MpdL XdQ+_Ը{3FhN[1܄WO2#tDOZ4(bU Y} bsu&Щ ;|>K䉐,Lo 2ɕ ]&G$w*O,/]HԂA$J6BDW㝦$]v:<3/?2t ĶHK;OK{wvw3k1AY$8r:[ч^ioHFS)1c淢CBx6fμJ$@.wv0擒)+d\,ubst_ad-Z j5>O.GF~[dV{Ncn@Uv?DyOT\H_O)|/h)e, 9DHef&EmS$t %u+TP ܿQQYb"S5G؝3p[X bFq~綥r7}ҁpP½sXirgqi{л+4Rz5fY|dbҤ+ӑ)N(582Dl n%M H x7_@]Ho? lͬR3}/I.>c?A6{˘qbκ8)ڄt{P!^8-"&&jBz> X7\)NWOcMcavZƦNW)6.{ F%J@|:לʍTy xv s{dbGDstv͋uCUtfyawUdզA0JY ZqgK@H.E,'[PuőBktS3s:=[IЏh>cRNmY;& M'\\w`'C㤦\ '†ǍnQS̥VW:E;vG&ud##ƺqBfr]]8q 3%aν 02h %Q>d)nKGH5Ѷu.(١/:;y| aʄ9,="za\7[\A6 RASܨKTqA;cThv\BRmF7A2R<ʖߎ.sEby~qYfrfy k@_>-6 `~*%H.x6cAy'|un ;"jdh|Pqشp}!k/ɒGQVw\ۥ=$j3K+ }6m\][1b6!J+EiwgmSׄQldވ'%R=n$vt|odA}svGL{QDŽm]YNrMFq80]_l6͍fSFYd K|YJ#NZk qNEd7hk]"6z[\)LC;mi@4StY28rVkս "i0:}8Wy v4Y] }gcTw;ܵ`Qk9#.iO·o\ ; AQKpSW?_iDuyJJ>3ʹc!#޾'?kW#MPR.5Zp "1.V_\zgaH+( 8gr&PX|6XNF2}W)GZ&\E/ه⚕P$_&xV<;'L3_^~wQ?U Z $4pZ[k' kˉ0zP9DOAZ5$an2?Ogxwz9C, zkKc3WWRVL=ߑ( 5b3 N.mz\0}RG֩XeF&_cYm 8u$=y}dA] W6\_6|MWOS y:PPlE,:Re`oj#ma](&N.ڍcU/qٽワ ƴ\\11ͥF'4CX]51(Hn]m"Ve,@ozN"zkó/ 8 GKi Lk&/.$4k]$]dK㜓}.Rh%Ϡc.ǟ;_;WJd~Z2*NMׄ[,Hv1$LaмiY]ăȁL⇆4q= fxWm19# jQOU(ð_.ϠZA^@GdPO{_WSهDr:7$D_l$  j&hbA&ɠG] b2fY` ނ'ߑE_@nؒ57ŬɟLw,k׿,x6n>{tT#}ZyzKJO[VN4, Jw/@0T}gtBetіN9˕#\s:?<+Q3Ri3$~nq2oY@Lhi9؜9s} h* f4?_crbGGQ:>YՔuҏ@u#3OzP *.a9妾睠ldb LjIQcZWoaf [ىt9jLghH˫"|C>ل`A[CwuG2#~(kd`us5o)ňi M%y 6v)b΄ @1 6sT~gcKv 5=hƾ^ `IdX2tYSQ(YYfz L1/I neKlNXc=G|& uG}r)L* 4.t.=#T6ؓ3me!6csCk±QE@ޑ/PB伽ysڋ^o`+!-9a/jJЮu ƞ)&]l66Ϥ?0r %ʐX'B;}$8YQlA\!CeDjS^H} 6sN/>l\d3@KJ@ս[Qvv(QPoar&  ۉpD RzKt3 zC^弥B 9@W *kɧQR,.Y4ˆiN!ˁ9Z 8BX> ,ewCr j$0DTb@Nʆxxss3|AQr;BuX5WQhLrĊWP; jy|]Ln>Lbz8:.\?)XsIJ$:^!=@&(FR8MyipJ/qlN|Iރ>۶@L)YGXĺUw6:Ui?򖲪^izܺT0&g1mO#ᲴO\~>>:v@ȅ!jL~"&E$R2U=⸧o~6BO1c̴+|4eTm֒84J^UGAJϵJƏUedou,-,3yoə%\DW1G44V+h=QiOʜՑvM`5^Nx Qr7iT$oۛ"6Y԰rAgIcxn8N^uF3mp? 3 ]9Yo)cboxƏr g.)ߌAII7BjJcű! 9ڎcV'1[;y:[xk0(ai(>Pf3'фIG*̏&kNh!*5X <emT B(tt PW>+,.Lp;A pN ~ DArk9 z/`cy-.:4ri&a54%Hy|eo(C]UICq}FTu^l S*y#U]*f} M;M$95|ڥ2 &˕߷ǎGOۧ"bKej4[־B Hv9 \Kԋ:##?h:q^;FY[x4{gwڨI$,#qAe̢xtY1^۽Ž[c1Ve xǦuf8p nl7kDbMSmVT 6o 2sTa:U⽱5yK,un?͝3DJޠM|S],K䷤#ߺFj=fLJ֞/R"֞'VWAlz+bHRDch4K)VK0=GxUe%)U٢/{O?{;yr[CMa^H_;'nLRb:4 |>~ Z"UˣuL7br28n;gȑ۸[At@z DRמ]]HY("בAZ"_g|g>S@2bdUhqej2YER@-zק;^ҿaS xf?f*Y=G/@љdLU߸`0F/)Yτn"v2S8,ApJ}x 瓻_GZM[X<'t|`u^GqIO^3iyPj_ф&ŅӐ|ص:c? YZ