bind-chroot-32:9.11.21-14.oe1 >  A c W^^ffxqia Qh 5wA"c VՂ[8㗱DYC֬ݻ*P;ǡ=U?e6 @*:0t:q9ncB4ҧkS[.+ηٿAڴoƭTh~o@|g61ˡ!?`E-fJQZtWRXψBa4 Kh1ߡyLj7՛'C(˱}V: j>+P92236ee2b4982fd73131dc554316ea5455ab06b3216e0beeec08b8bc1a95e9f1fcdcf4baeaba0e3fb08abce82b66eec0b0706605(hc W^^fDmTfV>U>1Uq3V Ǘ䊅O>rzE;KN|Kdl\|9?K 1u#t=X ^cl*8?Ȍ6P=̙.rs]7ѝP7{d80?E8[7hPп豐&'/ۈ5:8|:b* p]ML'k'enD҅%,]i]wo'%ɆIm<4A@@>pI?xd  $ g $HLw m   X s  & D     ( 8  9 D : >?@FG,HIJX4Y@\x]^ bcdBeGfJlLthuv@wxyhzl|(,2tCbind-chroot9.11.2114.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak c obs-worker-backend-test-arm-0006jopenEuler:20.03:LTS:SP1 / standard_aarch64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxaarch64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA ctctctctc_c_c_ccccc_c_c_c_c_c_c_c_c_c_c_c_c_c_c_c_bce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-14.oe1.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-14.oe132:9.11.21-14.oe13.0.4-14.6.0-14.0-15.2-14.15.1c*cAc@b_bDF@aK``8@`8@`KW`.V_м@_ts@huangyu - 32:9.11.21-14jiangheng - 32:9.11.21-13jiangheng - 32:9.11.21-12jiangheng - 9.11.21-11jiangheng - 9.11.21-10jiangheng - 9.11.21-9jiangheng - 9.11.21-8jiangheng - 9.11.21-7jiangheng - 9.11.21-6yanan - 9.11.21-5liulong - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2- Type:bugfix - ID:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:bugfix - ID:NA - SUG:NA - DESC:backport some patches from community- Type:bugfix - ID:NA - SUG:NA - DESC:remove GeoIP dependency remove obsolete patch- Type:bugfix - ID:NA - SUG:NA - DESC:add selinux-policy-targeted requires- Type:CVE - ID:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - ID:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - ID:NA - SUG:NA - DESC:remove gdb buildrequires- Type:bugfix - ID:NA - SUG:NA - DESC:remove unnecessary dependencies- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:enhancement - ID:NA - SUG:NA - DESC:remove useless bind-sdb package- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch/bin/sh/bin/sh/bin/shobs-worker-backend-test-arm-0006 1662710796 /var/named/chroot32:9.11.21-14.oe132:9.11.21-14.oe132:9.11.21-14.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP1/standard_aarch64/a3e71ad0613f5f546836800eeb7653bc-bindcpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR"ו/vfyif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8a78e9bacc16576363b902461a8392281e9bb5a311ca8d83b9a3f1c75b23b6f7e?p7zXZ !#,?] b2u Q{LUm,T8Vk2dy| Ùaz:+F[7 ]:NLfTva*`.*]6aAb,4%~]'@G>>b$M~,@xK6sA5fF[]EA5)A7. Su!趋G^4wVff2 ,} j}9:q\j-O}"u8N[<^kػen53\y ̾^k֠Hj,.J`WŒ%dJRH2a1n5M_._ : 92_8 lm GU5)$ƳWBt<7IJ۟10( Y"SaO$ K%&Jzp7YQS#&R!txZuCNc/#[" 5^Q24qHً.z!'rsـy%3é| l@  HS~:}h$ĘSL¯ZoK"C:bebYhf|Uujozob}TrQх& h\͝X8 Ljs ?ץ4FlsvE0C@kKfypa`a 1uD$f,z˷5]q1=މvX9؍ CiihYCY~fC@cIeps9yMsU9~`96ǣ*[e{e\pUfBv)$ͯ|S7\H; c"]6j"UyDbǡs?EySe/uyP"Ɏ }hG++U _]/I*ߦm-KoQsO]i9Օ,t9zTevm\ip7( &1:ƢSkבMz녙l\wlfe؛,+󏜏e` 9XbϲTѭWB2wIk5["e38gPC9j)=P(2¾bM;up{E&a;MrEs;fK˰Ϗ?{=EN;a؇Sw%y$}O !T8?Taɞ+R7,=7Ƣ 9 TCZM{Wr~80=}`4^$#%tW6]=#^s=ObL ̬ nuwnb#l YZ