selinux-policy-3.14.2-75.oe1 >  A `bW^^fxD2w,|iwN% ;ӏ(SC*:sn|Ӑo!^!z\ҐTz:Oϑ< [ 禎o4Pq HXvQ8H]yIS6+pRO?RJmxhpf<E G>` /]@$QA\9$gLת^T?B]6U[Ǚ}`WF<%9#,MÿzBh Lmk4V83da28ae8d2e35739c37b313f29023267c64f2bec9f076884bfb3e88a5b584c05fffccbebc085963394c73f9d87cae51b4ae0d839Mp`bW^^f{h^OYJPZeVYFF}tdDҕ=\P"0% ; 7C T88?,f'M1h)7wQ>JYaSl>t]M#q|ITlablK(v@xv?*` )(W)*[S{;^ǭ͖Dbx!A9H%d 2`b9Z`y|n`Uēb*:ZB=ֱU?jd>pF&P?&@d  <| .4;AH t          $ P   8 h  9 ( o) v* + , ,- 48 <#9 #:#>!0@!8D!@F!PG!l H! I! X!Y!\! ]" ^# b#c$d%2e%7f%:l%<t%X u% v%z%%%%&<Cselinux-policy3.14.275.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.``obs-worker-006d`openEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AA`a`a`a`````a```a_ ɾ`a`a31a8aa21badc73a33a2588bce19cb02b9511a2d336307a75962c1dfe278e7fb2a4e0f3a51291bb44753c7b3a677695a4325e8582a49fddb8861b7b2fd58ff3485a74d143ffa1d56f8c5d8e7aba163a15a524031e3b2cc626fdce5708b4cdceb248a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-75.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-75.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/sh/bin/sh/bin/shobs-worker-006 1624465615 3.14.2-75.oe13.14.2-75.oe1 0-metadata_list-compact_tlv-selinux-policy-3.14.2-75.oe1.noarch0-metadata_list-compact-selinux-policy-3.14.2-75.oe1.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/1db2dbc9da1e524556edec4ec96fbcdd-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text}'UUvs8xutf-8416a8280a7ead1537a5f8a1bab806a950e7213e284d8293f16a54ad3985c904d?7zXZ !#,jc"X] b2u Q{LQjl7ADkդy$/)3lFW==cF2+cWɂGt%}p>h[+bY_"ڮ0ژHc(˭(Dbr/&ޯ1eK<5 l̮TE[FVX:DSY*?lD@!o0l2" @`G$L[8KWN1 ݕxdu9u7$yR__/U Y1M1+fW1 ]Pk&L8zCror:^ZhU 2]L(gn 7J*3}P j\l7HҊQ*H_g#w̻:܀a 5 Ygp78? 0u OK|.^iD>&X7P 5٪E2RwtΫT -\lz B%MzVQ%?,5/\ypv U&j hl>ͅqosZw*8 FTc<5J4\REFHӖdxTܱ|ƙhjCߟyv{feM<581&cŏh'~/|Hf\b\BU?*;ވxV%aƾb@Ϣ(6w .gdIB5m-S_`*0?br|r.oAB]][%q*,7%F~ELKwA>RLH䔆ff+^>crԔz<%;֌I~`ԈQt1k'H>* Н-`]R#8{!yNh jy\ 3s%Kt?\:nTswZZʊ\Ս 0[x5mCR=">X`l0>QI-2@˃T<1rtApjUaicb{+Rlꗌ_kAY83>mGt@>ePw9gv* uL8ѓrƚFg$B+mR܄Xzk4:m=\-ѯ=۷^`u +#B( h{ŗXMyR9(q^0Aڅcdbgp*~ǻZ-\FimQ$]0ii}?U׽"̡%L !؋.mNg jChMH y)Q2@+XҞ]^-=gCZ|4ՇXԦ2*Yiw @δLu pC) )\B<'EfpO0Sld`غFQV0iҿk\_xgܨO= dO~A]S[Je|D+s&M|h 5;sj7^ڠv}MHLIU3: l:aj=a Ε (ZT&90>b:u:seԇ? Io&Y3paXIz(qp"` L_; VQyL5M7XE Rfۏ)y?f6Wǀrm X`MVDԏLSGi!_5b- +4Q?LN5a봒03"ΐ\nڗ)P-ڻhc]ͅg& T=?0&yu3iz0e@W 92ds\-!IdA$d^:8Aڭp?Nd<1rP1qCcG&v͸Q@4Q ޫ?04g%fgZWDC hGGNGV~(gK{&IބHc+u"{ FN g2o; MmRI^vVp-oXSJUMzW# v'xiYL9N;eSadQPc(%ɹa7jc2<(3@ Js60{UESCnd@c;lFFyKL Vy`K0+nٕ0d=w;hq Q 1I,[X:CUeK^Ga>+T}:hҷRuy3&p^\Мzt×s41-K.;aSqLE/Ϗ/ 5ECy.G:kC,~3;X;^~ի;3A?8vz1SK2Eb '{ٲ7a*d{4ԻUhUꗲˡoLfÄGf;@񻶤('CU|nHRqg7ݦmUhtsZ`n9*a\U3.'^JNIR_^h"\4l&0){̀jm:Hrel?V5j2/-so̓>w<_∆OpL{>%U)G*Mr/(w0pYIK)^xLy;:)k^ߟT7eNv/-֧$S3t7,Xv_bH^Y{{pj9 h_wְ3ShPn%̓6pM*7|(E 6츳m $ud6!䅽oKn@%[BVG'80l z LQ _mKEN:_QH Sj`JbҤtD6x>ڋ&VWH_AtrF!qy,ɽ gygσ+P6O_-X2D4<9%QƙP2So3QwЇ!"WKsM{%q@HM o1 lN_:&@#ZV)9ћUy7kL3kqߎmDhq*M9ɭ|ufAXڸsDw4LJʳqs$9 !{nZp4s`%"NZS1Iysqo&PP+IBb&A5^B}Vdl"M[:Wy] vwfg8 p19/tE ЙOhWEZ LK7ƇfjE oLD]hU(&..w^klr0$69k4䤜BaKk5Gxy-v%F Ȝe'dw좛@ f+˹?=\KTe|k] c\^~1UYi_ur Nh qZ$ʀ98FUS%;jHD)t/tzS,U#eDVydS"U:JKbHYekx 6I[^9ΓBm>IU$̔o5 ڟcQ ޻%4h[=qn)QU`/ ,Cd{s]ܞ#~ it"r%?é Q?Kvvsp n`Ӛ1=h'UneCx~"`aPX6٥=s"Z־Ͷ_"q\SUJO O  NgTP]s̊II? ojZ|>nGC|A s6EvZ*\ x% =fS<-Z403OI>MODPqAXԩ*㮶#>'8x[HgvNւAvB {w\GF_>5Vձ91nOtd* F2ogp,3 %Ӝ逴ƾ 2n1B_CsK41~tstZә3@⛕*!J=Xϻ斟7\X~qj `űl8zv_ǝIQbpl&Bae]Xr\auer?d $zQF׶M A4u 9/ `~ewz܋0{ka.X'T~T3`En!B+ӧ맃nghRmu0Nc=Y>6> zQhQ8RW[%8op>ң3@vќ:0=5d[?HP\7"P v^ļJ p_=yØJd͢0ya/Tߜm,%}!ږ`l6uNW-S"bDY⤁S9+\XY-!PO$PZM+|Y!8,nlǔ"#dJyO0 ՘TWN[d#xBoSx|)Z|tT i<Xe юiޮ:n"Jr;Av:S-\ vnr,>RNsNo c'UFjd3mR%i .9 fz[`j P*LsM"::V+#٠_` Pkj>gz!\3m.[ykڜ¤'~82R.Dmj&b)'Nċΰm%Λ _5Tӄ -k;!ޥ,g/A_,1j;C;.X9CZn<:0kF/ݔobɜ^n<6ۤڬ` sƚsيQt0(@{$¾lGG:DCvdb"s͂M$h8Ʀe>˄M5oh=2+ {7ܚ#o9̄mj+`[jiyL)OPu}:y! )*0W!,p)#5#hMexAHӝi256@O+Vuh nT\]A3ǬyԖr+lR$BhY`j{//G!χZ%GH13UQֻ"nŦcId[@pךe6_Nёw>4%*@)}iP |'bva[bd\C->!էyW^K_0 z̾ z ؉ҥQp2 :p2>!͵\nɗCais-%9$rM_Y /\P7JǛ&%+oF5ڧ