selinux-policy-3.14.2-76.oe1 >  A aaW^^ftipgXQ9;N5VM()?iCT,؍C4]M#ފl>qJ#FĤW}[gwS7~Eqޙ`Q,S%it0 ,FL! w#Iz뎒WߨZіYE Bi_M/ ko4T%OCք[4uS϶0!f8 @2uw@t_gP[E C99007bb81ac89e6179c404d807eb52a5ab224d3d20904e11358f067534e8cabc94cdca863c9831cf020065daf3d2bb3a08f2e4d8HaaW^^f$gLEs '͚O^Zqdž[; O[]uѠlt¿xKVx63|D0/- 3伭^ zSV̂9| n-i`:Ykp V%B%d5rJJ|#rxK'Acp . uf,*%L2 9:1q/%Q,eƓ?b S.s>Xa=T*g-7*./X퓍5(z L:y:g f>pF#?# d  <| .4;AH l  ~      }     , Px  y ()* C+ `, l- t8 | 9 :V >@DFG H0 IT X`Yh\ ] ^  b c!d" e"f"l"t"4 u"X v"|z""""#Cselinux-policy3.14.276.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.a`"obs-worker-0010bopenEuler:20.03:LTS:SP3 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAaaa`"a`"aaFa`"aaG_ ɾaaFa`87f76c3dd88b4ed2d3c31d9f62083ddaea36e6c4774dc58a72bfbd1bea6c45518a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-76.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-76.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/sh/bin/sh/bin/shobs-worker-0010 1640980514 3.14.2-76.oe13.14.2-76.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP3/standard_aarch64/db5c650895b3b593c21d17a5bfc49db9-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII text *@̩9Rutf-89fbdc6a1960e9cbed0b5a9d21683305f302c2876c13911907fcb65be8c063afa?7zXZ !#,f!] b2u jӫ`(y-7gӔ@kj9z.mlD>;.׸0`FvͲzUVd`y0 _? ı>AwZ|o]`> VyvRn;0@},tbk>s{pybSdmi=/p}RC+\qc=y̺UaƳGo;3=)R -gI$eZRUo2?QX벚qWcۗUCc}$)X|S#O2\  }4H%B VIY'ZLC//!f5tr>%.wܽse>0=n=:)]LN;W펣X bjR;@ȺFQ$i8-]$7*ErQR B8{uZ*|7V$3Ȳl wT`"nv4(- ›:MNf &3 ڍT:@@z9TQ@aޭ~"))f/.; tݔ/!nk$W( y3*}]wuӋ+\?͜bԬ,qv& B #vLNdc HVyF\9 y7jK5DZ~Yt]`WfRR$p@[1%$D=D氯z,o<ہ}ȕ.%&`S틧|f !0KS8$qkWc뗹?\Oۖ,c#UFb6zh`=2ᏼ0O޹"[ԫJ7y]I%:<1Tǻ SEZ0mBGH-aOlR@Y)={\2:@'l<3W<֪Ŝ4D8YzDBsHZQFz Qo@F㾏FEny|J+/ 8fjo%@ᓼ+zx&M4y(hN^I$]Q=wہ4g´,6R4I)NK (Wbgj7iriP9f&/ڠ#dh5-*)u`D) `II<-݀!/?%ihG%|s9AN_]EZdNi@$_B;W -tHcbLArF뇻]ePD)ys-4 QfVen \nBF-rH]atyWJZ, 8-iE['нcZIWK6sz&Mt,6j= `I [+<<ʜM:]V d|nZCczD2BǏ|I: Q"^/]rԤM^[f{K(Eÿi=}~Cpd mfFMSt1pZrP#)]g¼P&hw7g)'ߞK|B:Cv"neogS`eB_r\;OޫЕ*]bcfv`uz,Õ[Zy 2l[I{nUXoTmCoyFv(abṈ14ŝC lk ￸f(n6˗%1F78 ^9=9T_{@&gϹ#kQLK"}#,r br!fe)Ő͔xkS8peX8gcpC|f`DvY;}X–1'"^QgɣjPя:#I)D>*%ߝ2X5@J2JD"َHWfl%M7aG2?cPfeaNQ5kv P۴ &^9߾2ӽx 8 ^_F\y<+-h{Zy"A+^i gk[<1}0qbC~ ؒ894:OmY.vfxpJ@Z])>e, tQ(՘ZW. ,R`ZHہ2>bT U3 *a&Cp?Penv~Z iG/SډbH2>hRJjP"*qޝFWi oj]'Lmc60{?1b!ע}9sطR~}t8VOB ML:ՠ4˸ሂutL~2ow%f(>ű#L`+X;>&7?d/ v&,tE=jh Sv5"r/9 )N-QCe6J%X" WzF]0NJ$Ewtvg}Hv~dp}W)q/=hA'ȁZӗդBge듟`'׺qھeT4-a3ZvƗxERwI?uLŗtbBuLmier*[GSV7q]tOux fn&d☵8bMOĝuh$e˸,aZ?w_٭mWa.j;Qm RvT;G7kwΠ-e7 !ͻs.^Z*#GtWISI6 J४A(寞]'?˧ 1Q#?6qYE JIb'4FU05`Y3m ;Hj>MqZұ9N_%f4PI=ww'݈"}q=,oi[`>-)4'Y߀;[;cd Ёn an,2rKG"Qjy҄4z<0u9dخyn:\t溻bO\p Wz::,:H>&9FG]ve%yѝz$Ӓx{w c͞ zXҁ$sJ$mm쌒!7p 3\+Jٚ$4tԬh9S1zxf:qEg2n6h+Ѻ#䇩ƞ*tX}fE4x%aa>|;8؀ 3,'?[%m63*IHL2p\Xwpq D 4yT>˞RVpD@j[?$K@ J=p!43"F%\-9E}Qf6dz?rk<20(Rvؖ?\Z"svis?^AoTOvYǡ˸]]J(ӯciV}gۿl [b{ GӑGL-"-ufgO&t$#>ށ~M,1 qRM10}7ށ]FhŠ8|L\z7\1wƑp887f% VQϫ-bh=_Ya ps,9@) P~oe{z6WWGm藊N֏U?[3[(.pCcbXljqQWyR޷M7~` Z-Mʄz֕#oyDwkmEz6CN#t30߫)KY+]OCZ :@P(^R"a]$Tr[<; R9r8jnÔ@+wv܌++#Ęh™N($=1b;./{*y|?WAlh#ll4 8a&5; ]s!ѫL% l^('#L{1ϲ!Yd‚qH=4VF| \%lT zuS$"gL"r震;܎2/eQ沶@9B@(sC  ݤS ^ Ě֡ߏ;33Xߟ,UIshm5 nniC:w Pi.u;;$rm?;JѾ^0˯Ǥ:h+1apR)) +zY$IxMZ`*P絈oKǨ^u.NSD6TBOsm;O,z̀,9( 9Hh%ura\!گw #ӽ?U~|4Fx4߭7&vJdڸZoDNx*Fe>@)YbgFC{IJ}/AX+etM;|tKgJWxGjȐCG|dM:o*˵S:PuIt_|g~N©^H-8!PyhU+LNc&n#r wҺ7zFv5cɾT4ue%̱vrxʣ.MQ!'/đ웎x~Y3A(-Cܓs iܷȄuR/+VlNI5u"k㜹S'K״>;FuO-Vj``]= @' O "@}dO3tDfDE*cpzLҬJ49c?$M ٦e&wZ?pH"LI; 83_j֠h5l|`Rfܴ޸tO=bcg;VdYG6k[ܧ+ MUF*\'Ro\ > $$+J[,a3㈾s`_BEҏZG=5^t2tAt.42{ZZ@&VdLpғWt4H  N,S/'$ դ}@4ͫc"`7h9jj[W_Vh0-%Oږ?R#jH,}$嚷^lҗDe1dMa^ҜPMėI[ū(41$ P2ٟSJ49X_\7f;_&Ү}*_S/5~@hQ?Yp|FX2J6-3R!?>UH|_c_c&9%ųSE%@3uK5w'YsN'<`m8 )-펋4|n[Jl)N ACqVtZepR>YdNN20]i8`^"Q>bQl#ɻEzdM^{aߵ86gl"!]buyC%Pm@kb{g.hx3_ꞯg$WsIqɳvP?OQ\v-_sQRKD-*^KTЛ&zه{#䓻y:WSG;S9nBF̯/J}K6(“q w)$c Vd:/_ V)ó1QCu,~Mbw"~R,mAʖ/nUA8%<'Eр+8C|_~c 80@q|>_V!k!BOhApËƦpհ:=n,|G>sހ= CN$4 h0;Y~#zDeh:5[b0CuO (}\6Xد~r"NYLAr`oǾFjlQlNz}?}<3mVMքmK\_JQL Wȋ4Cߒv19 rUS9 qLYU cYC=D&aN8~6Cn NOr_S}V_aR9o8VVN9'OIԗ916+OrxdXaSt+_V('Q6Y;mS'9XEG^b!=ꙃXcZ7/_~#B< YZ