selinux-policy-3.14.2-78.oe1 >  A bǢ/W^^f 6ǾqlFlb>Үi. &{' Ļ>8xfq&bY'?"B:be) G7d%d= ="tB.`Cfa:ig̛v.TakmAEX}/K=&D23@vFg"7f0cc16b87b22092368688c671e778729f4dc18e1c6c1b7bf2245cb8f4bb1c2807e83a9fa3babc90626347d59447b05f7af5be7aE$bǢ/W^^fo<ӹnиڀaNm* | l0ɭ8#_K{6miVZM~P~C$T' v n~̰F`(>5᪶q\c[Y;b$j_vX/IQS#wJL /o[A!#ĥ%'\sC泵35m c{Xt6Vb4XPv;rcqʻxѷVu1?xg=~8l!H<8m4Fq'f>pF@?0d  <|  =CJQX |             < `   ()* S+ p, |- 8 9 :S>@DFG H4 IX XdYl\ ] ^ bcd0e5f8l:tX u| vz,Cselinux-policy3.14.278.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.bǡobs-worker-backend-test-0001bopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAbǡbǡbǡbǢbǡbǢ_ ɾbǢbǡd0977fea156def223204c9ee6224ccb666c67f586869c772fb96a83e81fe5238b8a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-78.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-78.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74baa;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@luhuaxin - 3.14.2-78gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55- allow httpd create files in /etc/httpd- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch/bin/sh/bin/sh/bin/sh/bin/shobs-worker-backend-test-0001 1657250063 3.14.2-78.oe13.14.2-78.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/3a740848ce71482ff9940fa496c0a7af-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text9E#&umf؆utf-803333b548333fd59bb72194f2918ed6e59b5433497004e32184c70b7e2845252?7zXZ !#,f!] b2u jӫ`(y-qt/B4~hf ͐܊M={IX]윕Y݅W v#ltu w̼ Iq**=cQט.k,FGMHY獓yr3ҸݎƤ9cGO \zAEW&(Wi63%}DF-|u8C%XI9> ͓4XETxfaEK ;˹ԴDUFH{9CySdΎ7 "&xvܬ7/Qw~4D)'i8 /h_:A(r{d^=n t/e-]1?&r 1"gNVσW}͝I)V tXJ=&]xbQpWnrs4gF蒒%mJ#Hـs$ٽS*GvpF 'N;+W)w_)]}st8'4Gq'܋|7/7 tB,3MfM05`'*80kfw q7"EQ9V/jqF=v&Dр5tҳ3ǣӳ:8N,#P2`QϩJ )Ax|}ȂW[ڒߤ&lwDwn?bQpgBHiX GGZ8 E>BK,q;-fQĨlr7? ]I[$Wؓ uÓ3jpw,8C&qJcu쟒¥f!U&qQk~*QzkAFD8)vFfy*7.rٲwyNZBI4!?.|<7\cXI<.!۬ͯ!(#Bq-mD~U֙@*jj-m¸r#Jk 1B76*num 3\Kzk-\v!ayhN"Tu ;p>+qQ(Um1H'qxS{`6z=BDf风]֝COtYz3 #ITx9K;t)4;b&MK\cd^q| !8b5;\_;Q5~U/s+VW3 r꼲倮s /HtuU*CdM bCA<ƫ|Ȏql28!Wa\W722>|8̡Z0X0PM6Զ.8<븜1*뫆PzszPG )5A"麹"ZM 9,NG BU?|<<!VNU1 HEzWyaExs Y`#Q^v;~O}3)a gyEO섒K.= k.:W&o=gb*bb A V foxҁm[9.cQ 3*xTj _L@ wiln~]=SRz_sͿ$}B=E1V!$6:91d6.IwhM?-%eq0WIMHm$gl@ ; ϏK2\ֺ?JU9`I7rK;PzeG󭡣O Z.@=" JwUY.ѝm v']wsDc@OA-ζ~P8yd@RQԍ3[_J͖ itLe6s5kxSek}1=:0°cNFUk, 3SKCݣ`& Xʦw;ٕͰpԐlOƩUbm{Ӑ~>ӭyE/(>g;G{:!{e-m8朝3K0X  |oJbD*#\7òiMBP͍:A n,Qxu';V~4N%kkQqOy@mCHzV}n E0E2X@0, ͬyP`S1Z,TGK^j^$x'Ih=?=~tr&Hoɀ`܇jl10Nbfu6nR/UCdTfoef,f]4DžߋEI5s=0l"@YSid,EuaOpkLP# `g.C+To%_LL;cM~Wͧ>}0FÇɷJ8>̾]Τ,*Mh BR:*+l}:+A5+!}ͰPak6s֬Ѵ?^ }}g֕+d*1m7d,9,-n,#÷C-9gA,d`%E`g83WHض#J+ EjVVhmP/5tNt^;fr AgaSY7KUt 0p?t'(D,DF_Ma@.@v0Y[H0fEG# m̺(4^L$= 6Kĺ\$}*`lk<}T_Q5_<#ԀG=@@1qa<]X(HL!\@h9iUnj=,mV 5DFRumN+ajf PdJ0PQqa/)9P)W9f#nf6ETCn)zS6\>hf/{^}*`%L+yCsxҩ&ٷn% šTX2M[Ӻ2Wԧ%4X+[9!#훡mA+ٲf4.cF/A: H"ߨYWotjT5'WbuCL \{}?@ =6C9g.+ RtzOҐhɑ^ne,Ɛ)L L5,7l#ml:kuzfLù@扡=YY8Ά@M(o9ȳ |r962p2},VL_OlM;K:  F6P:{6y+f|qqr 0oF.T܂ eW-1IxyTNtz=&"hb Yn~Ujn@cS~T*ڬ?5q>d:< ?I<^NQB$ԡ?E @C|$i#u#505y,/׽ 6ڊ H_׽h2-)7d zߝ#{5vyMXt>I\x%. ڗ!ͅFE괨Zl|5Ьa춘VɪKV/pQ %5'(E+umƖC4Q5bS%1 *Y XtE>hܗY} D27}$QN\$:ϲplX)zt_J'JU]kQ'D~Ƌy|P;=˖A;ѯ}pCMhPػҜ>HHi\ATW]0;Lȣ\_5tgUgbt ;͝Q|Gen35 ;O϶)FB9"ȵZ^<$rD)iP z^fn牿&P,-.X vq#s0uuw{%/ ~aN)u|>#(탿9 \ޖ`  paLſE>*?}zv3#"OMװ0uqƧE;tku>UőHoؐQ9r ]e[߂Le-[DMY|%o\L{BN[<>e"70Y@ >| ԵuÖ˒IFxw}4>4UVY7Lk׹lP3@e>0Xz ~Z;5eO0?l1tcO (_ِ 54P] ؆NI%?yqf%؃CKe4Rڛ8G>\2:X|xWc)#!i`*6?j<} i 躉VX>S>]A|ĸ F9ɣ="N?Khtͭ魝X*R010h+$\Vlx 9JH;a7Sy^N4 3L'fh9X`ɭ\:-=N$g2HBv.?7M1.yƞ^soPE,׳^.^*Xƞ˧W.liVc_q]z^3}7^nbtsS&R="Z=YQ&RJG\E չK$8i(v &ɟ {& PV$oE겘g4nU%|Ќ0ػ,'IEs  aIpUy(-}СP䝷h].1|R|ÃDJ\,Y @Bؿ`Au > ۻV j8q!x4'2ާ碵܍[+==05FR_1H1ݙT;3'p }~Pb"pY]<26嬃exhFTʟJfhw ;M3>r2c>m4O5!Pb[Kq}>z3CZEC}SE௹uk's[ʚ^36a:- vGc%X &Dw r'ukC@lnש:@c‘ v}NgAPd/lwoʘEcFn_7v1~鸀2u`10׷D()aêyTx4<+b_ HZgɭ~y;H5G[,OHɔ9IH,^ԑ9Rmy|.uل_;*rc%?u@:{[3 ,jjI|Td]h'&ՊѰ'1zT4QV?9XQ>ݳ0M"4sى|JUS#~ "QFGqH%崮cblsuc~+A8ѡ yfBST k{Q)ZCV[% d­S0ÁۥJ9r#j?M[h~Ҕ :D`U$zEA bK{~ .p/pKjL`J6?y>vDvmĥ;& o8|#@W 6f(Pxڨ6suD/" \#a,*gi +!45O*bȬEĖAб3E`Eފje RE巌G1grs +nf]2B]@D=G`E[E%ABc$= _um(gtJ?\Evdyny $,ލJLjT?ʃX*pP.sl |/*@6iIb6isŨ4~W^ʗ}+'^FTVeMz=u5nb;:c緈)Qႚo Uאib_GTǂʩy̛h}o]E,O3 Zq(ֳVx3m?¼Z/J]g2,wMAtV5cNhqR.}$U.qu^k>FPݽ]8ސGDc.#GthUh N[ˣ >ܜUl|#@)wST Wg2rldxYqؽCv@+A@._w{;@YoJPncX)0Ek2B,ߞFziOٯ1*E݁&K=xݰ C%*.(aԷs^neEԆOϣcz3>~c;+ : :k_,* BWr}Z +'q[:/Z=R-]L,?wmWb#ȬΕgK\V] b6X)= ]3S9y_jc\П^˜Q*nM׊ _5O1\dV,̔$kaY\