selinux-policy-3.14.2-76.oe1 >  A a!+W^^fHhYbiwdK<[;=8;(ըJqk# VY,DAJB&Wͯ SLcY JR ВLP.zEH@_UKr]ȳbnP]18f$,~0f|oi*$ŅL}xmIG'Wpug*G\LKiϭ5 D2YqT|fAZI 'ʆ> JŠsf#_r-iVRe6451a51092ca23bf8ae024a5e5eae9ce27545a4d7ff559f02c2b2446061441802bd1d75e70d8df3eb26ddf9ff876863a5a3ed312Ja!+W^^f}g[pVs*H\ e{dnaZE-<#Xr%,)%A®CBWzueʬ; EI" Ǡ~7dZ1X[AB0>lx뎻jhլ6ŏzN_$6Bİz?\zt6~ɍ;8@tbMV[C&skOd01m}2-mܝQ+:v-b?f>pF$?$d  <| 17>EL p              0 T|  } ()* G+ d, p- x8 $9 $:I$> X@ `D hF xG H I X Y \! ]!4 ^! b"Fc#Rd#e#f#l#t# u$ v$(z$V$h$l$r$Cselinux-policy3.14.276.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.a 5ecs-obsworker-206bopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAa a 6a 6a!a 6a!_ ɾa!a 87f76c3dd88b4ed2d3c31d9f62083ddaea36e6c4774dc58a72bfbd1bea6c45518a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-76.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-76.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74a;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/sh/bin/sh/bin/shecs-obsworker-206 1628512309 3.14.2-76.oe13.14.2-76.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/4c5f412090f8136c51bb9c6e403b9279-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textTӷݴ ]5xwutf-84fd51d538c30c71a716f188a221c54ea0eba7d7b94d65c59b1265068de1f7db0?7zXZ !#,f!] b2u jӫ`(y-H .ȕb /92:K.CVn]4,{u!վ3nj3vq3m""q\{g|ۡmZOTI9U[ng}sbw'Krc }ٗ6^HDi',ȹA^\ ҴDvFG :ӫJFkڐV1ؓSiv8W)ΩDA\Җ)ZR9UnRrW{%9,_s"_/ƻbs*RbPR4Z.,PB$+ۊ.$P;yU lu_hg(~xWRiEТ8 M9 Qӯp @sHe-yZ#RQU)yyM iSm*}20t7Zll~EWlK+P _A7N4Ծӎ42vC.lx%Fjd,!N Q-B<. ќi̟%FdD}JQ\pbRfJYnMZ`W}(*9o`H2HS v;lK&Ӕ0Jb):cmfſZF,:jrlzY.hd>'@PE Xv%??3r3Eˆ`_phu1?Qtؠ!*U&] \zTдdwLwy$eʬzіqN'wSmrD!&/+o{E9T+Fj9aU֯F\ʋi oL!h-x]J1DVŸDʁdPm iH5u$,pGb,VmWcV\o6Ht N>l#jLG-!Bv(innn 'լCXTaςgl.:lE ŕ 3; ؘFnދkr0lGG|q !bYV$8$L]l[uwxV 6œ๸93Dm/3kf ğM׃ϵPcgFd}p3Q0YLt~GMC'0ִUS #BNlInbuI+ցe7Bfzp;]ݔ2CfL&(]պm oC^PX`+vGCD{{ҍyI6 I$䜅AKxj̔ u4jFeF췶}N]3 3~WW,X@'-m7x `KcH/u.l* ,"K] Urm+Cg{.. i9*0\7?U`IatD4peR7TQ ı= n"_߭dE!֩`f}h9G1s|n< lEB0Kou_).hڣUiGmӨ{fO*WV|7HaoImV=H1XS =6Jׁ$+pro`X5AN31MN|s+' Q#(X-+ &oT>GJtdu}1# Zgg*\w+dȀ9Pm78  L^z{X"v3Ӡ0yz!ТSYt2LG{Pg FUnAᐾ%轊}R6*,~K CPHgڗ%VP~{ͽr 2oဴ %f\>ܩȤx]^^8z%ќqK_\x@{N*&ͪw mme ueX/ˣGBxAqRDdZ"h:叵uXcQ<M:e[]:VA.$fgƪTyl]KThcպ"W a> )VI"7zYłkiYxs9r`ʹmpyNFö%VLx(PKfXjIJV!*8" <XEUQCYZ&R,..Zravi8X}a7U^p:͕Cr{}mzFϛ ! /VގS<4ff8!KPCj5"띈aw#јëYn sfQ(PT׀Vd'J:b\H|.[ ~Ov,C[j̰Xt=9zR!oΑk&V/OpQ'u"[<x7?UE)z?uC \fSϒ>8KS/ЕDcarюxM Ufy_cCC>`x 3jDzFS޹?&PK ΆrJDcc?i{+(RK H8z5?Z~4=Txӯ\~TRm>w/*]"3\S^qiƫz~XPS:vrowqT_Row9ֱB|ϰFRѤf,(}95ZӒKCжd>ERFc8vTK`".9fUQW˘-!o? d^Z91lf2W:^a= ȮfmB@aHf}dY.u$_`clg^N^D ~iy[Z\L2k/?%n4Yt8w.s9Fcu"m7=:i[ B%+v6RŢj⎡Sw?4Eđ}ޯ:gS~T_#&7myFQ;ɐlXza^zߊ˾f۷|ΔcH-㭤'u?y|b2γ)a_*ePdft]tKif@QPjhF=uGDWV0s #&RCIV ISA߀^sQ 0=;]C"49H6߈BJ/Q_ܧ^`5Zˢ@(Z.h1>J; GJ, nmpfM(K˔ש%@V)֏d$N` <|&x;(C2T)&(Ncbd;!HιnzQ 6N~l[{y4eQ\FL|Y=tv*u7=ՓVW EJ~3jg|Mh/ϣX4gH#J&@  &TC=`I!/cA]~N?ye.2{ho FTVSZ(V ^.6| .BK۩dN 7gGR-(x/^YR ԑ ( ,mXsH QR@n@OR @@H%Tnv}Kdq\I/YYlP^0U SXyZq񙐀d|Z=Ogw鼋Hwz_8 )xP'7>%JܼY:kL%pzҿ:t1acUtbNô6hv/_R,דO_>B-|t/nJSR n Pu%E*4={%tPYs̅GʘV2N+3ܵ}۠Ξl.> ̓$1c[ oqfPȫE*`Xê^K"IfA$E3$+f##B(*sB< YZ