selinux-policy-3.14.2-77.oe1 >  A beW^^flgW7FEHH"?u*HRji=%y. 6ã Ե+~necjmk~lgT XϧdSd_NF :])'ˎ? )SmkFޓk@aVA@!Nm?9"{s·p:͚ܜun+ S˨$]!6 9.U)}ekmM#f48aca753f38fe0665e1dc1337206285c04f4f4ddee19b2fc99661b4fd9c7c1c7c0a40934187e79daa02f61c363d523bcb1a260caIhbeW^^fjd  Y"ZICCJ5 Uu`|G'uj|ڣ*fkvE uLrpF#?#td  <| :@GNT x             8 \   ()* O+ l, x- 8 !9 !:!>@DF&GD Hh I XY\ ] ^ I b c!d"we"|f"l"t" u" v"z##$#(#.#pCselinux-policy3.14.277.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.b^ecs-obsworker-209bopenEuler:20.03:LTS:SP1:gpgcheck / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAb2b^b^bMb^bN_ ɾbMbccb5e15b6faa190b363a29089389d0d8791f84707a27452e9d0624752f5350bd8a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-77.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-77.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74aa;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/sh/bin/sh/bin/shecs-obsworker-209 1654766174 3.14.2-77.oe13.14.2-77.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1:gpgcheck/standard_x86_64/458d41731169b95efcde890221c79e29-selinux-policy-3.14.2-77cpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textW 1Autf-8f517cfd5acc0c52aa9c634230bf9af4d558001c8a461bd21977d85e44ec62048?7zXZ !#,f!] b2u jӫ`(y-NS 6ys_eڌ.BV6f4Ɣo; Gy*M2Z(bpc"'0;3B]KsgJYh@$a 7rOӥRws!n d^__#78PAzf)"r;E^BGx?Nց.mnxB,YMR>L'`&""?_?q"%r^Ð,w,| uN Z5;ʤjЬitj;-ȸ[MǍ6)(܄>db= e3 ut [tf#|0R56F N=Qd%}v'F򿩵6:j\"B0tWO ?m#YK K \haO{J@, iqA m'cبǼAэ6='oHjaV+ |հhq:{1ҕ&{g VVLKc;6|"Qt:@cawq>H{'/8_854x}JaɋklL2yTfԫ;'ƳMv4y_<ôszjSRݵ)ckN28{_8}?T<`Kբ0>!6ٔ;F!NfnhčlnqUygQ9 ^Y[ŢE,j!-x(p5-NLj<>nˡߙ6ټJ>[;p!ԱRDԣ}V츔Rb^$e ێkd~3bvIPCfVtig\I'yK >.+HɎ+m|cAͬƟbͶiy=95 "* ՞4@gES$Ѽzi 6rOwm-^ D)w`^o`zKc#]"`OT$PScLQ=Ž3xG|R !R7 I= (J_O3s,N!/t8U=fG*_mxGjL1T9@J 0i4), dg,.>]Q,p?*7* 3F@AӭJdu cƕPDgqZ8$(D7/MY4+=0U/'pY_nKNhU2QǍl1+F 2Ed4ewofG$;%UP92a2~9NJ9˹Yږ] аM/dV3 *bGCe;z/ȹ)on8_*.Ql-InDۍk<CSi9\*_aʂnF_{yNhyk<+Qy-ma[S)X202NB/+G]e;Ȁo{JL LM;* JD&ΖrnupQX(#U9|>ݼRØo4Eʭcl6+R1^}iDD^ރƜgV+9Fцϒ ˳g'} Pʮ~13^ͽpBBrD9u3 BM){H`sAROl<^tX˨ϗ{ַN.[]( `a 8dM,qq?2pؒ5!&~Le" * hĝ{k܊k.kWeDݑfv밥JC)Us@V/ž^+`S&\$:Rt~;Gh@O D"mVʨٚISCdA=ZԤ.[ຐe GAe1ia6t>[Kz?7f% r)fuG"ŪޭW WO_BR2)p蔊S 7*YKڒZ4WP•p"-F/^:sOփ1x"Q [q:OR(?61:f`ܿY-3WbW x ʯyYJ #ZPNҧόs"B\ra=ib}` 9M;Ld90!UNBÐf7( lky n*_ۻs?0] %^ }/h"+jkv蠟ZM PJiau)&uav2BDBߥ@*@TkhC%;R[9gS9ʗY;ź`! GlV>,0}QTsY mU =QI'iu0YdcΙlAgQX6CS}Ry"Ƣhcd7wi#߄[d~3 ԙjdUwc Up;CHfZZXsEXw@)yf'=Z柳gdS s+ FbN.)HdK"c(2BC KpDᚵ'HBCejGҭ -$J-Cp( y\{95 K2YGomTG^_.3)VCbA\6 cTu,V7:v*ub?ỶmӪuTjbax44%0˿*?U1}uO)}[}D <+u'>r',&\S Z*PBCLC\P{S &m2˚-Ǜ-,/` q=\qqȨ6AJP.<MDD;{;p@jѴS`BP rk.USTEB CO4,UyQbaD0ؤ\(%"f`d<ϠDɾ5~-v&by!"FnEO(c5#az2P m֞MͬÊ<ޠћnU+Qo;52y~DND(8LK}[7 lM/N=6Oˀ᧌؊N3ɵm`Uϊd7WVbq>Y]MQ; ~*("!糫ql(Bzˆ¨w{^Z627 5 dFT_xYT ݯ$?%vw0)O !KS2*$T]#q om% H3CnRR 1,w|etӀH$~0j5GG ;% ^;4f4jtyyp$ZJU D>GS(v.O\k~.C !Pp[lU#vs4 hިcu&gۇB!Er nc6wⶥmE؊ nіɯW EM-@s p7p,[@bO~ogˌ,ͥ.w(('pTJB?4¯jܭ 軙KG 22_Б*KMAD]vn`:!Mxғ"a?5nŷ\QRF" {=_Nki^Y|ogDqBRfvr Pﹴ֖uهUf6*e,ѵB[U{,gPUcO~ B;H7'uX1ibe4 全 e=]z=ok)~kV+"lq$捴h\:h^kXY`g6if osг Ŧ5[#g Y&2T_D G@M)nE&(n4H7(iG}Pm95CpzS8MvAeYZKsVzLɥ2amc̬Ì4::j kZd(˅"&tJlrM0u['Oe A@8Do(rD41@t&_ F(1? 3,BO$ go>RM1Bhu.) B۶ϭ~.0UT'!(*8-$ 0cITm5;PDФO9fϊu=+'<{P `zTOg`@6xK /ZbV]έ ъ n^S@jhݚ[D:N9uK#Y/ľgSD?CQ=mwsqn*^eB-薽Z_TK@KbT@?;g9=Nl`eGe!4*qJH6+R/0rOe)pE!Ry-7mV&ACudLh0r ZW-XLόIzY-$>n¾|WHc"8 Ztuk UI|vpRa-jMvg'Gw$/ n=>i$ˇbYi~%%gG"jNSGԟG[hY pvQ;i0L5ٴIlד^ 0׶$̥!M+SSɧ u]yDaj* 9o #1H@TϬIɎ6Qϧ.O:>76 VƹE/\gU6>y уPpmU0q)_b˝MIǽ.WGgw6BSLUer +'G"kC;}OIxCMS]^R?;K8x%+lѮP SFwDOȮyG>;YCċ#D:G }F =Rx(9P`4mW(~zC"݊Z ^XuD4J5[|&d'עJ&z8Pdj ?U)^OE< UK*z<8@ xsm;.7tVoLÏHʠT5,6Лz}{…H"& &h@e0`ݰ.t'.یZnۦ|RjE.zꬒR-To(I#PSW[s %pC_`x}"ͣwn96T2RjFm3z>KT{/, rqedmXBm'4G]@wLda|h0u(lL0&-XCMI[K ϿsbXư_ iX$sKOQ0긎4թ ˄XRZz.rZ<@JdxC\PzM$HAm[,'CNӃi;YAHYVa%)۫ <Ϻe}Yx*ceۆ5wͮ#PO(X2;kv?8lYaǥ~mxLj*]UJAEl@[lb hRMܧ E_mĐ^ 3Pg~t )cͤ:?nFr_Z\]h,~iY[ 1&S% ڶI6+'ῺMsةK@=⯕PT&nJ&k5}}0R$Y 7KV6VQBzAu Uʑ脋|+ 9'^,2{Gso=wZݳEƷf*VLN}DgL͔+Z3sJ|0tmskڑg2wRTu@vj~X 6BOk YZ