selinux-policy-3.14.2-76.oe1 >  A aa=W^^f@,F=>ț=r61+oȁ<{hZva#,[ Dׁv ,?o+kО~ kܰ)p: #cdE_rK(6~X>|$ܼR%ܳ酆BIÇ ۪z GgMĹy39`e< s绑nE|ܹc|[Q>>{AQH"CKk$}zqN- =E29b81102ef909e40792886e9cd871bf30be3ef70aa5dc507e1377f3e112d6e3ef631b255970af50f3f78400974128de993822916Iaa=W^^fezW@DXORF %tM#}@!bCV1>z26 SMCGS}naRZI5^ UIcTTľ$Ej+ʞLĸ(Y=%ԭMM-T~}ᅟ0KdyH )aPWgS;yCeI(Q+5lHHOjCя Ȅp%WEǎk꽝A] xuê9ժAYY0{-*f>pF#4?#$d  <| 17>DH l  ~      }     , Px  y ()* C+ `, l- t8 | 9 :V >@DFG H4 IX XdYl\ ] ^  b c!d"$e")f",l".t"L u"p v"z""""# Cselinux-policy3.14.276.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.a`iecs-obsworker-0011bopenEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAaaa`ia`iaaa`iaa_ ɾaaa`87f76c3dd88b4ed2d3c31d9f62083ddaea36e6c4774dc58a72bfbd1bea6c45518a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-76.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-76.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/sh/bin/sh/bin/shecs-obsworker-0011 1640980585 3.14.2-76.oe13.14.2-76.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/db5c650895b3b593c21d17a5bfc49db9-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text\PW!'s52Eutf-80cf73e66a7068224cc712d40367990625113cc240ae60bda8722aab8bbabaf76?7zXZ !#,f!] b2u jӫ`(y-7gӖ2aR}<0lL[3϶_TSu!?R"yL'겳 ϪOI?D+;#nY\j|Y:)YKUcU0ni$iV蟷W.=*egRb23NRHHC꣑çcߕz.o|xd^ܖq]J]%']cVVI4inY)&L\Kx8Ds_<$RS(y64LtA?ULex3 &ӭfo: I[_Yg)%b4ii$K# |'8~쇙L"(xN˜~(R\ U>v~B@ .9mvcӘF&mH5xMŻRTTo;T-x,cG+ `bRl2dDT!'F}DD-7HE5ϹV H|MeB {nCEG@$6㕏^&uUe&)u;ܾ́")roan&RT_0\'-,u4"նBDL39GPMǓ:.R['(Z˯y}1>Le)ҥ͕nU Rbl׵9WkiQHlTM9#InUgĩee)ْ X-%gG E7sP^d;9eF$ұ:;zOoc $> ƛk%26`жw7)!*"č,@&OjGJ QFy=Y&6%wV Nzv#<3nRZd(uk 9u*D`Lh;62\қ1@~2>Tn &l}*cr$::XW?/o1w5qLa"4WZdbT'F:ːf_nBeͬ'i(ICSѸڸպ~_0Cno*_ĺduzDr6u}d.rEZ,@$]lq }ni&7l)*"sU$/@[kfm!ӨSou~B?VZf` v7/|mtU۱}gq% 4\l]/ʨI}eNHKձQI-wG?.*LRs CVƏ > 4]S_lX=JY_b 8ov4^(q%_X!mP׏B7kElz[Uۓ/jqN&7s"`>@Њ|0ӷf,("]-]|'슣%~Mt^lx"$:TV_;/P sRbP쉕H%Imy]8rA͸e+[ȗXjI~Umć/KnNnKӪ4L6#yqQL]R}wT푛'`YdbDYa֝D4e0z_)IBr(cRnz9Ql\|H}Ó/낙p`Dq!iDqωp'? i6,‰0o\92Z^k̮j hBD7G{ $vYXEyBL.}!cu ?N]S,t_ތ4='EzH;YqrG-Y.MO0}6q R:M)lf5Lum^֛soQ]nlWI jZp}Bcl9ZPl[`RF:(+Ha6ߛذIR{p $Ժ)5TB.oJ$(ĉjtJrYxv5'J)zd ԛr7B-eˍFѥP΋QA#Y_ gxz:-$^brTիZ֊vƜ~Hnj'\æN9I%oߴ攍_5y$E9lF/ecVoD[빞!){fG ϽqFG #R4QZAL/Qzr+O]6֜aڴ e`8.Tw7 E7I#I_z붼mDO?%]6񸳱at19YwB2`3-/ݞ|k` #*kiF= 17{t@ ȁ" Tpa0ʕ@¹PvA?2`L?jרNۄT|٢@QڮH)#E!&8"Yê͝R! u%fb3)AGKRw=W Uy޶ڿE[mg3bEOm A \v*K,X0wc‹Y4s}y<+b4IPL(ǽZ $ KM;&aZ@(a:Eue&-}R; "B? 'wTvHK'U3O$x(xƾG棽1ߞsҨ1}Yl@tօZ}nAT+7FDÖA\t5[d-dY:l%ưpx߿[ \k|l:8#Oߕ :Xsdɋ!J3h̓Ə+(EY !c^eJծA!~'BЗZXdvrc8tHnXCl0ugv9T}v 9oA7OBWOgy;ϊk[iryS% nEyh#7C2U*V͔Ri!(SM!lTdږ ,%.)ʙ3ԲԿ<ͰڐfL(69} Vj ڻ[-$j!u ש}^͕5Ƴ=hgm=czvQ=e THEU TKBCqr#&'4mrA\CZy r4͖y kUY D}e~\1] B>aiȡ<+RRj4~e`k*L6&x(mvֲBH~9~Acj5GV@?W؈ yOYPhN+oLkoǕ!jC<#ƞj|e[=,7s5o7#T11)Ⱦ/},[| L7P%QT](?Fnq 7G ew >:[sDxh%Q0g3.la8kT.qI!'f6/M_RA?cU&B#])/ѨG< rbX񻀊ekj5:~iF CDFPF=LF$Kk^Z+ v@d!{s0z^)Ew p ƒLe]301֍2}@9Yq/W4Ϙ9o9'~E}Âcގg|Ua<4wda@4MRgL ؅9IKKy$]6/}B00̓Y$`],863_Zի$735@&yjt3G9{\IzQA(up$V2@^]͌YƟ882xs Nj;N^% y}+y;wlb;xNyq /`B|]DZsUqP݌ɞgGKTwlHѓ=q *w=+zjfl0 G}B&Bbm5ߟ6S mێDYhB^(sE!H,^XP3mD껀6#iA?P,#o}NHNG0@Dkו\l/)@֤ZTaͪ3˹I݃l3G~ إtVY@,D%wZ!O75|/u'J~şH-r \w| h]*+l83j'wr}@%kJ{~emHB mGm<;?M 5n@5G}Snmб?˪#GQ004C3ڸ.Ĭ)3E9`YAkB`0d_f$GðNJU0õ0Ck2B eP:A@hR 8<&,/R0m-H7ooM?7Jp),|=1<=URےE% ],~) Iv>1*ϻE9җ3g>xywmqPPRw5↍3W o,#+a +|^ :"8=h-pH.},OD2$m/$Q;"š+3Ӌ0k{ /OĎO;܈!C!&5Xe`HY#:M;h3bJ7-`ҠIٍSb7ؿq*p3Cj4RuRUbCGvsZ]I{Z]djc'HfIM.N`}9X< b?ʊ{IMZG%' 81+B_ky׌@9//O3e k=WK8qxn<ܽҸ[jįО'6 3oTRjJ;DFzJRQ9t+Jyep"<$6zk:;i>hTEh65he=oX/s_>b}uy(9 Z"3lceeii#(:S箧,FC͍mBz܉FPA[3=jqP6F8t/gm1'ub_5ut}5`z&˦)P I+Q U(^cmJCLt[e; ݎN],%FO6@|;"PoDnyf9W^3tw?myZKH7n䕉D 5߼< ̳"Fb7BڲI ;DJQhmئ^u`hH@-KK)N> c1URv4;$fT/ 4% -?`t c;c4:p0 Q}4B; jua3H9\u[/} I y^Cc&uVj`vyYH@6i>A\_ (G oOmx\>$jp{!GH22|S?uP&wi<3]"98Gj+AU[KUkvGׄ)m Y 7 Av !訬Σ#exV*'̩><*kp eiw'+o8[4^@*5)m=X}]VN3/}7O9Kbԉbj!)b?,UFң3yNhexx֢10'WFz f:vvae`BtsOz>6? gUV];D]:]BŘe:٪w<MfC) >9}:v~Ȭ_ o8"sעV.ŮqF=rfl+{i;{z84lYGw2Άk\mI; YלBH;^?-~1KApÃWZ|b1z';Qm:zF=!U#hr|؇%!|O`Wk0?#)ȜsR9=B0mBDD/L) HN98FStrds?e*$pBTWtќWbf pKh~tL-ſZW àLA*+