selinux-policy-3.14.2-81.oe1 >  A dW^^f%ڌ:Ūâ5RDz_G]wbTny KH |Ci=ph+O5ɛn |\C@|`w%{WEExŐKTgH!Q82HsOjla"8䄏$I Ϭ,)JBbse}[tB 澿{,+*O}c j/D-uLG}DatRU.?/$@n2B30ad0f4ac68ab1fa7e0ca4825be6c65c92263b9601cee4e158f1d1b7aadfc45469c476a31b8be6edf8a1d40fc8401e34971e8f34CdW^^fohC܊m񌟚 ƃa48dl)( 5x9U@,rZ߶?g @z%滧 JHPd 5xenSͰ׮P`+۲ &O g^6sM:}޿_ I)qZ\\UٱHnײ`uQf:mxBPU٭,(M: 1brGC]!j&>.򒱒$U Mo҄Qxf>pI?d  <|  JPW^d              "H l   ( ) * + , - 8 9 : >F@NDVFfG H I XY\( ]L ^ b^cUdeflt u v,zZlpCselinux-policy3.14.281.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.dkobs-worker-backend-test-arm-0004.novalocalbopenEuler:20.03:LTS:SP1 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAddkdkddkd_ ɾdd1bea1af32d5cf11af68098fd1442c8f98b92e903a6161b4f48e5dc36d736c9048a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-81.oe1.src.rpmconfig(selinux-policy)selinux-policyselinux-policy-base     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-any3.14.2-81.oe13.1-53.0.4-14.6.0-14.0-15.2-13.14.2-81.oe14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74c@cc@baa;@`]`9@` @`@``,`_@`P`L@`B@`>(lixiao - 3.14.2-81lixiao - 3.14.2-80lixiao - 3.14.2-79luhuaxin - 3.14.2-78gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65- add rule for hostnamed to rpmscript dbus chat- add the dependency between packages- add weak dep of selinux-policy-targeted- allow httpd create files in /etc/httpd- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports/bin/sh/bin/sh/bin/sh/bin/shobs-worker-backend-test-arm-0004.novalocal 1690351979 3.14.2-81.oe13.14.2-81.oe13.14.2-81.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP1/standard_aarch64/2d4431b6548444c1f38cacdbf089fd3e-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textlWp1eZselinux-policy-targetedutf-8cd4b9176f0a731ca2502bb0019651911df4c9520543f9162459f2c8551f31b37?p7zXZ !#,f!] b2u jӫ`(y/=Y͑El<. /iSz˝M`<7kPJsGZJ>'"5-g=4ӵi0ggtkx2t(l0NT_>EۅnrǶbAU$WKˌQc6O9"ZF&` uK:i 5N FBwb{zdG7(y8lyUiL$v.C Al+2 B,$r%vK_>L~msJUPđcou -Hlr Lش,"jj^rُ0{ϟ^:L7$اK_dEi8$܄Fm4J6<ThrT'>z{ٗ>o,q_ZX8Xrg7~֛ōF%]0_& Y D@Hcʡ"/2w/8KQ & M.п4 ι,N3??BCeˢ$砩_ϞV  V#[|pDptll'+>:K:,\9j{T{vm ïG~/ (&nikN2քIx |oZܹ4jfW⁨\3a( V٩VuIA޳Od9kCߪ3.  ~?5/K)nPo{ZT e8#=eada!D#뉴1xfS7 Q9,,O$Y5-^"+NWWd5~qvP[L7TlM4h]V'4=i2MJBE_#!I(Y; 9 MwsAXd1R솀9 .ˊײݭ93uOY7}sPޑ?8OP+xBZ\7z1sH!DvS?svNGV啨8E!"}W6O ]OZ 9`;ne edkdIJǸkpJpZF lWP)(̜orkV>zMF\l?Hz榦VMm*{ ^>F!Ef}XԽAL=GnG$sL-i=gĴ cX/n rM^,Mg}0~Ǘ\`|Nh&X UR*`q,6j5@v\E4)Q6/*}>v7(yD`~b5ѭ58ɩjXh/Z5w' 3|G.aD_ rq2ec]5ඡhXk*2-Cp]+H Xv9azI;}.n&VxW-'' 0'(ztpMC О n|Ƚw2ؓVX2LS1Ax@&rۃ+(G8OyKqm{g̯9ل>XR]m:0yon9#1C(;ʿ0 u_ቄ˩0!N[';ºxBex!~NhV3x<"%W(K'\;;s rp1I˸7yZ82О+$}pR-͕I&ih];Mî&Ly2}]r)Vbzl";W;zkZԞuW;? + oB%OJlOQqO! u2 ׳%_wUO!u{V1`_>o 3u;]: sbvw y(n^8Z ބdt`=`*v,9$$Q ۳`.f#%jca;$A+^0f:͹igP r%}N@q'Be/1HYCrb:mJS_߇V/Lz0m4e s3^]0'碶K'(ՀXNO vZlIcl/q.kju4b#8/FQCӞt9d ( _q~G"(9M$ȣq>V3g=߉՚0 Ca5ߊfqwgouB2 w0شB0ǥЧ:KwH _3 |TkȑE86 r@=S5SĂ` &ˇ{Ubk}!/y8ɚ6~̞*<<<PE-nS:i/fSVN]AuWT 3TVlɄyed>] F)nxO:Zzkz(PU摜8x~nm )ROR Z֛?/jK߅k1f Q6rXvHh"7A)D˯/{\+cs\ e I5/=y@ĹYJugLp>&>! gQ_F#&.&kػZoέX*%`{ځ _=j\a3$",k:.O k?҇ zN/PμD6@r:?V6֫pK0~FEb̘~8P/ſzwA5uF pK.{(lLn sI)>{ bf?Y*Y wVo͍Ɵ fhȁ'-dzᛴRT5F?"G* p,G N?}d2#6q Sc푋 T;َץotTT OH 8nEWfE]nRn6O]{5=\a+`X=6qlOB^Mx %WT4 @ }L!S'/#+Xڳw0iHe^C.W(_l :-k1[j^cDwtvp mi<czcdLÑZo3L:NQX_ jlȫ}@5 v8ﱜGdyOH&n=uS_Dx_X6 F+$d)F{fC׆G>XthcDvҕ71$\w1KιBY[5q}Dl!Ƕb"uBX˵z 7i4e*rHyRN(net_7_/c;>/@RuJ;Gm%;/^oVU xx,ME`[뜉bq5ڕA4wf4\2'R®.%pYLLagE$'aˆF>/XY9Rrx0X#S>z^M  -;xt`t?-`@ 4` ۻ)$DKUy): ?)Ck}3mwrX{ CE}&c6C 6`* Ԧ6Bf/zBX nE '>kƸ ?`Mi%$! bPh.r gԳ[3lv= >- <ƍeŖWq8>w)rFeI[l>pIp[gP?ySMSMr8WPS<57G)rgh!MZtB-_:wNhEN妱~q~Bk{y1 MVàhA9N"Z 0}{ר8Z̞:ܘv"}xPd9:\\њpf:oF]*}W7| ŀIBleN~7W{ C.Oƪw|AL&81ٹ7Z)aX\1Ls6#G~AB6N&`j+m(v=`EDmn&)QJqp)ӕL|:'v-5;"wx8*=-YwӮtjg+>C߅kD欥Ց{k U3t "bw"@lP$6^ Ah#vq:+/c*+ԩG8} %35=`浟]]"Ȁ 4 8R3pMDY5Wk^^YZv),@mB[^<.RNd>|Ŗ%0!`u8|- _'>%[JX Fj~-*cY,dL8\J/Ud4~ ]użAmUyT0ʙ 0(4 edz\tpZu|~"-s8D#,|VOFٺU 4[go HߴrldYq;qcOXy+M'ӗ!@_xk/L̕Ԏm*cE\EskhRI#383o)!yLp@"5jׄ Y\1e[SJH `\y 9pId6f;;έN<  xƅ9r671҈z꫆>K\.]Ta];c}z7`щc^ɽڗi\ Km?V{b'H3нj:.-@Pi 9L hd-z4¢t4N֎nk:ͫwPM\>J4AW٫)e')1i p_3FGsgH ͠O7_{D.68`*DwGVDm\)ƽW! N5ja3ȣ%%FCHDp|Xb/j9G/{)BF@'M~ d96Az L\"@ŰP}ǡ駔Gb!9 ]Oi=OhDZ-%v܈YI;=rOb(Hv}%v>RjK}fችRc~t(F p|s'l[bLHqqGȗ[ Ѭd5'F1Ĭ67;@zcr،z1H[j z}ʜ rI]s.FM廙J]X=B3Ϟr1sCgD*"&2 k[8?/)4'p va>ԟ^HپyLgՊ2vbG6~mMg8T$>CvΐektK?VO6(qND]dKIޛDAy[Sf?qxljL9a6M')z^cb\&<:'%3wy Wdպ[Sߴ:oyb;)S0%=[,* =#[xJѶ"8$,\27 4׫nBWH"qy݉wߋ<ƒ²Fωh;n𜰔P UK*.o*}B]Pw, \X(ہaght AEY~ o d/t%nABW!hU}dcܛb0yRM^3~.лU*6m?IYFQÌpL QЈhnEG~=JDGEO-JYJj~r@bTTE*#dEGc V[H9SFg_Kȩ>V;p,9JOkL mI\9wOlPt'v5"S5Ev]Փs8Jqx $Ǣ|:gK xF P_{:s.ֵP {ߏH{!ЂY<$M.jɺw٫'u?v H%Ot;f4_yHR8'B19N]LU0Ʉt =w D^GJ-??VRewg:M"]GCmo,$*PY0i9X]wfQ>)c~x> O%#f!y v4j(t'* Es >)}ǃ|OZ2g.QO z\>8j[P:#a[GMy}+qD$N׿tT"3}( ey!#~df?߇k8I,'Ee& =1=\?o]}7MJۂMB Զ YZ