selinux-policy-3.14.2-81.oe1 >  A dAW^^f]0 lњu7Gw&h H42,"S9bzpY+jmfcKɎwxw1$gJeu@Yq;X|+ %%üۋ P^ѰdW6 #]H4!JMy^, =‹o\V2$`ϡ\ӴpôcGB(Z_} )26܀BtQ~9ԂNg٬,s π1b112600fdd1ebcdf2e642c2429a0d0eb5cf9ece9804ff7ee49d2ecd429a65a4bd0acfa3f4e769846a427772dad5ed61797decaaCdAW^^f7rgl'I i _H` Po9r_ 2߮~wۆ!>ܙ\j8Z@'XDkC9*ZIhIX`^-H5?ʼBIk @oaj94mYu%j.9"wO?>Kh2vd7݊w~u:ҳJ:sQCyiē蹢L$0h{APTa;y.z[w)"XNW=ަCf>pI?d  <|  IOV]d              "H l   ( ) * + , - 8 9 : >F@NDVFfG H I XY\( ]L ^ b^cjdeflt u v@znCselinux-policy3.14.281.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.dڷobs-worker-backend-test-x86-0007.novalocalbopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAddڸdڸddڸd_ ɾdd'1bea1af32d5cf11af68098fd1442c8f98b92e903a6161b4f48e5dc36d736c9048a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-81.oe1.src.rpmconfig(selinux-policy)selinux-policyselinux-policy-base     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-any3.14.2-81.oe13.1-53.0.4-14.6.0-14.0-15.2-13.14.2-81.oe14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74c@cc@baa;@`]`9@` @`@``,`_@`P`L@`B@`>(lixiao - 3.14.2-81lixiao - 3.14.2-80lixiao - 3.14.2-79luhuaxin - 3.14.2-78gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65- add rule for hostnamed to rpmscript dbus chat- add the dependency between packages- add weak dep of selinux-policy-targeted- allow httpd create files in /etc/httpd- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports/bin/sh/bin/sh/bin/sh/bin/shobs-worker-backend-test-x86-0007.novalocal 1690360503 3.14.2-81.oe13.14.2-81.oe13.14.2-81.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/2d4431b6548444c1f38cacdbf089fd3e-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text.`L^dXY@Oselinux-policy-targetedutf-85581e584622742184d25215d92f2348788f03e696178a5aa854ebd18311ffbda?p7zXZ !#,f!] b2u jӫ`(y/=Y(Lb$jp/k O72ڄ?Yz|65JQiSKPŀZE/$S=T]RwrA8R [8r@ &Q U kau%H9 [d0jA:w5!L!0!ѱSqӭe 70`u)G wyɡ0}:T67b\R ޒNSY#cC6NC:&wlɃE싣u3Σ[8X} Jځt.C$߫6P %Ǿ)~LnZ  pPJ<?";PW<?}[ %?@hExrȯ~$ii9;t$ի(,Drm^TViPIR4,+8a%y..٫MG"￲۰[3/y:vKu/dFbΟhȖ6CZ+j¸U~ 8tBQW~ L75.Fl6;..YՇvCY+Gwv&|`0 pL0a{]3qNiVPcuwyXg6k0bLpkF*dWUV9\f [g,,on^&vx[ڂl) Bx,h ILQu?i} M+MdM}Q* y#^H;[lMuR]Sy62I)Ύ1Bh"YEFf\!Iv h[2\DwQl`8f)F -*%gך~+bɈ8N)Q_87j[?10Ыȉ d,6Z% 2gT1EjɥV[T 4 E@r0NO|S\ 8 ۤ($[ N&:)JC38 $|Kk:I@m} p8#8y&]:9ls^ %Ksגۏ~ .ɃOlQPJx"' ]o;65~׆/>ʻ,8Z:nT7a,-cFabv"6Q?PeD-kZ^JOj:,O/AmE]Y;2=HpgQ1[ '1pb6"HMsnƈ+R+J9bdy2's"e9Srn#evYl3InUޮ#{ |g -RioW+eg{ڥ0ZFO -xp&d=[$< 魀> L`hRq09| i}YgUtӍxɒϠ6G1R [zm'{%Oa"VGBśĿ`s5WIaǁYKt־tY}\Ȍra5ʺ8d\:ۧvR|<${tp8nX%"]Nh&IH?~jw~aY:Ɲ<~+Ğ^mTQdɲ;y?\%LlY9kDzTő5E @뻐@{I;7e/'lgx4 9]0ř8k] ,8>-J/(oUS2Fю2-PiaǞ3qb)ß 31i_} 4w_89-`xMgNE޿-^8+:G:zۤD3%_!$@E;Z (Hp^˵}}Y\av0|DgU6+R+XϠ)~)/O ([/ΔipdQzG4Z&knF#:Jwm`(xjZ86-wQw4;ɜn~X㼡ۯ}/u[.xܖ$#p٘akmZzh;[9zjY;nBl 3~IBTjNa9 "3TuS^d:V1[z.rLWg-cc>!e[2TTӂv BU: #|( T5x20wvmt#[8D}݆Kz;d=t= - >Y\ ֺ4#Ȼw_2(15~=i\Sa+[Y S3s[YosDr# vHz\>>JDq7))ͶǯŒ }+PFI!agf'u`K~39Q<<~YyS,Dc&!Bo\%;0S ό8҅MºnNc%Y w\}Nq UR(^ =`K|s^}a_xͼHLI΀|0caCN2] >e.x cǰMYtDyE5slLa~𢋠a[%0(9yѶ=̑MTxuo?HI Z̹ɪȖ|>-sw!qwyүr.AjCu[(=> Ƒgpa&Tdbf:з3Jz;</TaU{$(Eh?Qz&C*U4MHW:*4;Ԩ=C)0D T[`lkGlS'.ӑ r>=^x 4r:GBXMzZlEX2a~fA#syk8$vJw%Dm Р]CdEuv4\zYdW:cbu4b`GJq M}HAFAS=J@Q鷮?|̣0R~_6'юSV:TRtA{Ӎ\`zJbKxMQ/Lo0ժQQj}Td½:evz)L[e9=祙_d_#Gnm(F8O_½hf]+}ȶ'.v_^잶l%꜁9iВ!,`T<\V!JM,)l!@⎃Zr?oeHJ\8SW#="}g:<)j~;pt}`_+I#s0mdFrYԅ#+ǎ2C{/j <4Rc`p t{ܤmXJ-3^Q͋|tj\y!^KdRzn"8<1z<. ToF&ğrty0f;P{'!.Ȏe6x+0@-!^ `w}z6xtoJ\9aCnYA(PBfJprs $i>&7B/aG@Bz# Όq҉U_ 'HFf$)}uz~K'_Dް?g~Hn=#m.9{rMVl\RR)2l=tQ ]:rGKQ"І|Sʡ9g?.CzB/' ֕3Ht[Kk6ٛtӋ16Vy_ !gzY\OӗMcE6VGdzf,ۦ=8I/ozp"ٯd>5Q5C`A΄ﱀf&W>PDK0!  ?nq߆l|lld/OjPQ@P#VTďQ&1|XMI2M]L_ $*{T:% T`| $6" S 񋵞:z+D:iP67ۡ+6AL`/f|x]=U䬲oWb/ ) Yjx\*H>f5p_<<Ϸ#Fہ@F+2XPBӄ-Tmݕ D HO̦PzkRM(Ό_/"؉G'P%2Эއm]A+=lIsҬs#,NJP[kXS5kVWA*,f4)_v%~*`Cx7Kq{9e!.BrjWh]f(rcdoT҅ʥ3Wˬ$y8.](/_$~qUZzxtj:f@0OO{唝&;cBV3zm=-i1W! =]. .,K: $ 0NqwI J5Tǘ7xA.$MOQu'5X&!$ #Lz|wT ;`1?M0Mސz-~"ZR:q=l(^]GOGZO!퍿oӬhDF?!/PKDA*Ib/n`g3bit z__(gmt/?5ZI/a+26Fc@Fj ,bQVA9=%[!ۚ2QeSѬv:,!\(ϓ璃PiȦ T,eFFW&d<:1ީ <zw#<33;'a er-,(|Qط"BC^[?er`Hzm_@r\Z; QF,(!jfo^Eإ,`{Q2qۅ 8fojl˱;,^)fy9iAkWX%58 /g&Nm-cAFd6.Y؄srͦu"Z&q)c?]ްz"6 .:] +\^u*]+jԏKbf!΂e@Jwjկv=_{>i^/U9r7x&a zy1׃idi;bR8s ̻gºBy3Wkwst0aA?` bڪ$ӳ79zoot NE_lAt)Ek}Udn \:0Wb1.TmX"飨RHя KACC!$PF,q63ƒXh(@>@a % z I~yv}cx:0 M-Ԏ4th{~ W釽VDbwрDOsS;!vS8}NiAObƆ KA!{ƭj2pjUr.zی6ɘ6.5L!e~cWv^ ^,5QDLj(g*V 6: BP!8MdtꂸV0 ѩVz5=p{d|A9ꔝ+^9cd>W7ڹm<]dYi.D_M!AhC|ɟ^ ,?CsE-%@&%do|R2=$"q@TWA@tT `ȵ( mUTx˿TE-;mEkVG+PMU'^f' B+ 9~urXTۇGkq t #ķ88O:S!N(alb(ZC 6) Ht~.]r-2&Ƅm.f~7%TcA?f##ŎSUQ9?e &N5J#@G4nSX:K_Nv@KHܮzt msm*(*h[eŋ$M\qBUI괸C [om$425Ɵ 6OK}}5k7!͂'$ Z^9Ң^30zi ޼j0bf;<́Bv[ 4c``@Ib0 X 2{rppsؘp]{TPYnwZO58Jv4cAE)MEI""g&$hX9`q'e:%i^WD}c+p{I5MAVR=>n@@0\lBk0nF9g4r|VT۪E^8 \A;l\^DlԸdacKɣUl f/1;Gk7\ЦQ%lY`!gVi2GP-nD]=X5tdٳq9A&֔oxW4\(hc].k(A>d!3r[%!T^ ==w\C}hx=**`XjʬSRدNj~0)Kl/Nе swL0cdpbM_$b!/gٰSP@'Ѷ#E j-eӏhT kU6(SQFHyKāHf#˞精;oKl`X P6_{. 3l>XdO}!fKv h뗢*.ӄe0 90b*b:~@|Գ5%\N,OInn((O[nbNG*FB Զ YZ