selinux-policy-3.14.2-76.oe1 >  A bW^^f`5K$'iJvÝ,5_ʯIq2 6sl 6)s2 A7r)"W_ WSKus2&m.RïJY~9U*ƣ@?Dok]c%g~8D5qĜ;"%M,%΁1;]_OUN)2)"~hO%A$>E(c3T:GCf>pF#`?#Pd  <| .4;AH l  ~      }     , Px  y ()* C+ `, l- t8 | 9 :V >@D&F6GP Ht I XY\ ] ^ U b c!d"Pe"Uf"Xl"Zt"x u" v"z"### #LCselinux-policy3.14.276.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.bmobs-worker-005bopenEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAbgbnbnbbnb_ ɾbb87f76c3dd88b4ed2d3c31d9f62083ddaea36e6c4774dc58a72bfbd1bea6c45518a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-76.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-76.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/sh/bin/sh/bin/shobs-worker-005 1645123437 3.14.2-76.oe13.14.2-76.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/52be97fdb5ba8e5fd5b01b26b46dc77d-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textԅ+^GN utf-85e1d76456981aa502bbd53cdd07ca86a4e35c363ff8ce700e72b8a70bb7db370?7zXZ !#,f!] b2u jӫ`(y-ی0%<6ÂehD"DtUQ|s2_r wٽab*%ǣ8B%dk%x6ԱOʱ ")nDB#?\Ʌ·ƶ&P[0L pLefrG>!r/P2B5떟 FAA2"헹J i:?/ksu~3zmwe ;#'3nSB4۷B@I΢^2[gQ+{pZɍ 3xBS$dgAC+%EzI0'28F_ʣ'u0.1~s[}SָއS(%(` $"U2hżM,>FW)T{`-?!<ߊ'#*05oHR,yF~~5Ȱ T#b4M'N3片Z)4.?41pdiߗRqO~*Kn z:7e*%(+KGٯi@ӎi]+ǕR̠M("wZOZJA-T_45$Ύ8V%=b?>dk ]}j^v: zRh*7jP.n!k$۔\7C7y0ixXkl}76Cs/S:_D3ng(2^8f:WBoOU綋=ɴcU#ދtea&|xѸ@{3urhO5Ti ?P1̴M[ҫGz'<},C.0:ro]e.tenM>fLP7OپOZfev)0}QH//zr5g'Q̚BcqJ(UەOQqΎWFb3,!h=T8I~U2@@@nG)$(//Év„h6E v 3,<hC>.RygN/>[i+ ]ѫMUu|;v7ZŠ^2ަb" ?N5lǡ*N RN=1H9k]yT7Gs tfcYi3#N` mЭ)Z[csN߇$wE>̈D!,QQCo1u 3 E׺"CG%w9Hv8VhOqbFcBJ1;кI&u~hqSN57US [h$O@i5 x`K%%~+W|ɼ6@2यapV:|\H :IoqD>f؇n  \|7GM}:NBu`/Ul #3%TY\ )M?k;ƛPoZ?Rc CDX ȹu&PKrL|ݞr""qO7Keb5鿇YB!@AQ!aEv3Ju'P_ܳ=}-E#mVy ;+kH|($O}rƒSE'W4w9=0jiͧG2y{_Z{HIh\?d`YQTouFG%kujtZ>$`C(BqAG(.91<>&ך 4{ P"7 )AAYs5MTZ4c bmRd+6ȖA3{b߲I:5&7S:\h\DfGyi vGx*m"-QM|ػ;og !2>SlM~V7)Tɘ,8wL >J#(ڽq{i95?AHqsh^1$|@ v{\BQ* Sa!f !&YI'Gv=/_CRI4:htNȧYB"בRjP(kq3`Luy>v麰I=`chmf cL'4䗾A*!Uu!"M9˔GRBwaTq1CQ Ԣ)Gr m"gjJ[v?*쐕ocupm>J+'ٍA'O`&qmK魐)NӲ2o qގ-gtSwNߟ.M\Bs.ҝ 288Gpf^'|M]ݺ' ըoaz+)\xb'jv+}6;;˙~Ua4x_eKakޤ"Kn(C"0,x&z'ZioX#B=ꁬEZz6YOHLN `c0{MI&o\oAI>Si}?}izn"Tfj (is7V&jl8A">5HPBuq0)?Pd )n- '=0. #mq0zk'~tyP) c'XwڠEYM[9HN"#KkjڡIRၭ;MOkw6ǛW5$VU+bmR! ȷ49Ql}ysl63]uK@@}yě;aDZ>FF͢0},XLή bPh? $6)ct>)vt]$Q*04?#bYfg5Af5\nh+洝3t` fRw\2gH9@(NH-/ XXJhSomщ52=C+s9s~aT/);S^z1,&8&$̀3S'Rc.S0h@تE pZu#ڋo}nXHD\}0,s\m~Ŏ/]@RPk('/9#KPWC;G[}rv N!tY?Ւ뙄o #{$Vz‹f(yqzB=A4jLuxʼnj&PL +~~ 7I縃,-B%E?8zf.8ea3DF sT*b(~biUnCTm1qmLŰ=([C*FK¶pck&eC~tfցn$Dɘl-eƶ+dI JA`winps\E_%gSgr1[4{DMӺZfeN3wMH"^Kͨmb@p:2ü]2tSv RZh\lqE* C ҽ-p,>ɼtf&jCAΝ}k2[W?zPix劣WgBs`{OR@~JޅoA|a;k'c)ؐOUu% 1S37&D9ۘ4b0!4u= =NV[a+S`OWqj;V^m<OdH9 Ù(ٰH^EbLzMMHvU(GH爉CIvB_ 1$+]Y?ˍf;1ê)kVQ8n^WNWJ+Bz8ƌހ(&OF^VYK<bJ F¯/{d/eoJc}cxTV D HзK!5 ޠ)㛮v<#D[5ޫtkap˺\-йV:njh!I9|xHmjo,7/X!ъukb0~F,LbIGuG3N-ѣ*("UU9Ar$ vgr%Y: pSx}+hvHhJ|'NऐMSLIMk Ʊ>};J+~dƱ*ɉ20,9Ҥhȁr+ !n6ݓJ>YmWql$JWI!s/]: "(/e&Uj|Jn<^&rM=l z!4#j9%L3׬بtxN_r} ѯR*< I_i]vmY64T"Ώ.eWX+BPRJeBŚ/8f MCdSe4 Ause 2y$9?7xMN+Fض_" g$U@X-Jb!AE"SL$~la#ʹT!ub9m՚oBKTƣvP-Ai]ڴQ6YS#uϼ &ٌg | 6>_BruV̌LzoǬHST7)>#3蓁/͇[0<ŧ-g}j.mXEqC qw?wOb$^V@PCGT+Exhv@fmc[ jC_z6HN,9S0:u@|m7~]ѵM{\rv@f"a-5|aZ+B eW\0; \F#Dh]N xWz ճuy+ALl}պ>BeCͺKWp=cud+(10/c_ia,7) b̤j#O1#Qbsb{gLWzm:`hY :N@kx]̸ﲡ(X1z8=$@Y)΃ 8!ZA#L e}|sc.=[늉1QRQ3X:NH~!ܪ_CHUP|5ʅ6߅ Zh ۬9!ԫxy%~'՘HgqCP H,q(Eatx PA\ӳ*<|hO0;PB,Z ,Oց/`L?`qD&vOҤtBW9oS_Y4Dk<@U#$> v0p~ևhJ&#k85n2L8 p{1j] ^/ѩ>RF_Pr ~Ra)`|[MƫY8HdʳXSN(O;?$B z?TZwdgآ/9u9ծ+"BNcᢖZyHfpuC7tmT$R6ȭ/B< YZ