selinux-policy-3.14.2-75.oe1 >  A `kW^^fJ(R NrUF3u%€%f&X5}lI 8 v#ɝdÌ66)bɈZY8d(iH,rJlL>K U媑`ztjv]X%K|c.PWnw Fildfk1`ҴW$X_ Kjyp`Mэ`|y TjBNA]!a9dab2259d9cf9435d970adc35240ad8e3721af7db5f932da4538727f7de436de7eb26595fd62a143dec7888e6534048bb05a8b2cM`kW^^f@ kP`HԷdD0Hm_eሼolW8yPΉP@/~[RÙW`au0VL7=8-#+..Ub!:hF 黉hx0H7Ⳓ?_6IJk=P,{MYKz{ [RtM}֛ Us]Sj";䙁|A(lEQ򼮘1bʍe|ެjd>pF&h?&Xd  <| 17>DH t          $ P   8 h  9 ( o) v* + , ,- 48 <#9 #:#>!0@!8D!@F!PG!p H! I! X!Y!\! ]"$ ^# b#c$d%Je%Of%Rl%Tt%p u% v%z%&& &&TCselinux-policy3.14.275.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.`jecs-obsworker-204d`openEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AA`km`km`kP`j`j`kl`j`km_ ɾ`kl`j1a8aa21badc73a33a2588bce19cb02b9511a2d336307a75962c1dfe278e7fb2a4e0f3a51291bb44753c7b3a677695a4325e8582a49fddb8861b7b2fd58ff3485a74d143ffa1d56f8c5d8e7aba163a15a524031e3b2cc626fdce5708b4cdceb248a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-75.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-75.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/sh/bin/sh/bin/shecs-obsworker-204 1624468124 3.14.2-75.oe13.14.2-75.oe1 0-metadata_list-compact_tlv-selinux-policy-3.14.2-75.oe1.noarch0-metadata_list-compact-selinux-policy-3.14.2-75.oe1.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/1db2dbc9da1e524556edec4ec96fbcdd-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text-"8)gutf-825a1589cc884b220de22365bf0d7dd5464e1c09a96e3c5eba031abcbad8d8631?7zXZ !#,jc"V] b2u Q{LQ}xTi+*-c x*>`Ov* #$b".oN@@Jnxp4' A5!B6ONC LJB@)3g.<)Zx[5gE=dR0Ў[ ),=mbrzbCdm_$ʳ"CR h8rA-CO 9~si&Ϫ"+/dV8W7q-=W3FGs߭ē< PR e]2X/ N UT)`!`W1R^{V2=+VdU?o`R ;~pTozN \*)?qkwN\3WJY}ӕpn)&Q[ۘ (*nqԤG/O~j6}Ca}C鱂K3zÄȘP ؃/߫xPKA& yRɮeq~qcy-S(@bSZʫs r`9/޺J6o=fWw0KϿGH8=⭓<Y@ҬJw7\ƾct7[MI.yhPeuyor9ߏfpV{ 5rC&Q`HAͳnͥu{r,gWǤL=DMs%)#$ߛe?؛dDy𚱉'o:urP[2HkYK_Py<9.ď3h?ߣ:rWE+rQڂr W~YXZ˺+(/@ylk-D`TIyg{s.`MSRWf 텈I ,HqcL-gSV/_~6n RgR#=<4nĪ-I`-~ooLȧ6aR|GuSvˌ{4ioR."6뗪 <']G53i|=z+|}Twh_aCtV}Mp)Hh49H|9B*X0(O@":a$HB֙451?vl>I]]>w&v4G7h"Ո:)oCޣO-j>_:[<1Z@f ~Z3:c,eS-Ӎ` 1U\vRsOt ߜŘFfb8MO}xİ_ԫoP+SGE^:Ex<xjzz2.l[uh H6i$ lݎ9:@FZ=wb<O@u_D_M'P%їqϘk>-|yҺ~|vN̑ ^#>j2[y;LWcϱ -KA͡-J-jOx'Gݵo}-W^Ǐ|\3Ծfk3F q\ǩ7\6+ ) b%ˆc KHuoB\l*<zQwX dLl31La/?Qb|VrB*F!rۯ#T^sиLBdISZ{uUzaԺMVgU{R䖇s i2cdY˫zDyEeE[}DG7o[W5t:MGܐ׊IRnq|AG^c9X,Z@uQwK8jKh$,6$pA%2c 2 [c K< %Dp V'n֞U^KeWV&-y"WeϘH$Yyy?G i LXFp~Þ/aβo*cͭuhTJj;A/#8]:R 50Lv#i `b(긔"q*G`Y%:Ƿf+ktB)RPztpl-/jRQj!͊v?8L4n7խ+ buv7oO[~$iRjDa8eYsK'}j jxHTUڮ^,YXXǾ(KȰnm?Nq41 #2a ӟpʊ -s>yL0†PċaK`"Sf89%Zk]Y4eK\K~rڥ Vp$Ͱ_lawWgPI=r?@~$ag? /T'=m- 䄺%$%؂1L+{urӻ ЄkM]]M@68P1ns9WJ gTS(){tm$N.}fa]Utw]ʸϢ(G_M0C\Z2v~Ӹ^zbv(7ً.*H>>.s]W寫6uC)ݻb2∂O  ~Db#+AKvK6~X\vRCmh_oBBeNxV+ i>\1fulIΫşɂ^J5`s]RgȕEqݒөbs7 ,O4We@[ѮP{mˌ@]0ja0e>6+uf丰c+z\7+$ۨ}(ł}EYbv(@OX),8* ԫB%`r0( 0(2Fts^r4iڽn4 Es#_(Մ^XhcM*˘حl/a"ɜů?aX7I Pg8祝W6$&+W.qS8 oD~7] ſZZ{U|f$'|Vh;D(nayv3t_t,fS2`un<| _B&+9{hI@д0˫[ܛ z(jҍsjMQ ^]_+WMY/ uw 6kh,#*tjN"\ yX| 2 (ћ*L_.`譇Pr~KGUdb*ωI^ۧjcuYJ LekLJR9eqmי7&‘#P`$AEc 4LP_o P)5}۬5 04nvDbڻȸUR)QحlնX٪qmG1ȝ13]ys&{8GϖBR&Ԓ[dMYKD@WRvYk!k۞ CXꆄ MZ9цkTB%_xOq!hQB1>Ԍh}S$W^,x͠?6oz]-/ӃԞɱӍB N.dv/(IF(i?8҇De y$/a=qU[D4ݜ3gǝ9j6t/hUsբ1~NYhFqs#}4LަJyu^t`dZlE]_ɫBz037u %Z.N;{_}Zuy% ?-3㨭Db4xCdaAQTzB7岤ъCf*RQ#,[Ň=S}$HwZ]5Gv*@yb:`,r*Z1r$2f+57by_fDx]||D:L9Ύ;2 FqƒKDnEu~*oh"HË;ܧlJ(Ŧ6kXh'2F8^Wڬ 1acwlgkhYDl.Q}63Ngɴ$p8M=9$[:º7 GD v\oq@.Zu~t[!Ңzs#kҾF?78(/~H;oE g)u p!F|27Y׎dQnr˭}Ws4ނ+pXr*5wJ&>VB'\};hQ=-ct:M&V?lxOGMz z%PEaEXw>:\VG=/)q޺)V0L<_On2 a Tu7weTtrVϥaV &(c3[o(N̰d69"4sK+!1CWt%Ea\#}l'\fဪJ~x.wȉm#eq)QtVl*4<YM %mf{^"p0YfQ; &v uWYoȹDR>h fWZ'K3L b{ `,jSGP{ Ta'%mLdV${=,\ QGq)AzЗa 31sVƦd [v_f m#0KiNmP$M"uu0 o%oHc6,܆h{c >Q8Q_gyUg ix]cz+%W*LD OFL4JXt׉sRo+,0]aw6cƹRUݢMt3Ɓ>H"Ca%IMSY=0Lw _5u%sq@7nWۃPѻƲ^]F2cX'sEa.__s#hav L$ |އmpOZpKGVլ=[ $|Doq2{,4ְݢCȷ!d4P#paDG'+e%e5vpoD‡%, NXFڲ۟4ZBxQ*_;룗<*U-2DF?7pX>D)7yņ L?9Ʒy zIF0s(F:shB.PW{F$Idj; zgYnB)&k-ȔJ zc,M{{$Efw mHdu4.sQe{]>rZBԤ[k, LӊQw.emΘ`ສq .c~ 6hD#(F*9Ʈ+ TtFu拡(̖Ў3Y7CL-B7Sɭ3rpv^]܁4.H6[{{ZIs\|Umpڑ藗Mi{aWpҊ]/wmǗݏ4n:o kFaƆzяޱ27UȭU#wPdsSKSEAyӇQd© "7@@RWro[( q%Mm#!Pǂ 7e*4Tw^o\U>2{]Bu~0M[LjC"FBx ϕMDx׎CAB̓mКR?;Ĝd=ԓ#_%]ʊ}i\d~GCDގ+&5%{o=5DSTvh2 "yXHpr5<W׆^GjSX3Ws7~c8GSw)3欠4O5? \uß{"ڜ"KWUz'M`a5w}Jk'Uƨ$d*Qkͼ*g1ʕKӂۄ>ƞ)@SU$-?IUdBJ7FJvbr|Eg*ۡoT)T#1_o_A.Wkʶ]*%+ yA^(