selinux-policy-3.14.2-76.oe1 >  A buiW^^fbg >7'Bd`z[Gc!Uh~#9@5=BxR}|߷lt ?& i{ frܑr2:CK0}USNVJB5%'.Y>L˵ %cLk_>g?yĀ)D.;oIC( }lfjP' 5yYy{t 6NޅջR^Vn_GJ356a0054f19bd672343907340584accb8901a0441c42d83db78070fba5a3c66c2cfb203d04ec1809b662953677887614d8abfc11I0buiW^^fҪ䍹Hc!c/my >iљ>\rypF#L?#<d  <|  =CJPT x             8 \   ()* O+ l, x- 8 9  :b >@DFG( HL Ip X|Y\ ] ^ - b c!d"<e"Af"Dl"Ft"d u" v"z""""#8Cselinux-policy3.14.276.oe1SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.buPobs-worker1639015616-x86-0017bopenEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=disabled # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAbubuQbuQbu buQbu!_ ɾbu bu87f76c3dd88b4ed2d3c31d9f62083ddaea36e6c4774dc58a72bfbd1bea6c45518a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.14.2-76.oe1.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.14.2-76.oe13.1-53.0.4-14.6.0-14.0-15.2-14.15.1/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/sh/bin/sh/bin/shobs-worker1639015616-x86-0017 1651895376 3.14.2-76.oe13.14.2-76.oe1selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/d2a1bc32875cd85a269131fee5bdc8f4-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textf6Bs 6utf-8333aae2f86afb95b7615563655c3574872d34b7eef2392ef5f19554c51906a98?7zXZ !#,f!] b2u jӫ`(y-ȏƻ*fȚ>1(-"iO<K'5אl R!HA3R> iZBg\ yNuXZNlSLyAggkÑC~7p$޺5~k8Hm`SA 3R9Xl~R½Q"nXZ셍\}~wv Ne]P.b銢> ϴoZ\Cf:6dŔn?LRZ0@GΙܦL_c$.U}(`-Tn~`7D 6U3@o ZFLr@s=6ئSGh8u@ %6,[CߦE,"YqQWҲGޛŮ ßHY]`@-UJurl֊7nwb|neₙ?!QJW6tw#C}Z"@qZ6 "KOnD~Wbՠ\m'r%E-0Ҕ ՠ 57}[r,}R7=RU;;8HKΕ%JW ?0X _,n9f4t/ dR:5Cחѵr]#8?K71hl;ؓyFSmlTǷ4Yb+DP:ϤETRv|/EꌠW_c]>JQO*SB oXT9#V*p#zf 510W3wm+lZJn1S@}RKY3ͯTL@r*t $#=ƚFxy(y\'^XN$uqu;{{;RܮLσ8Mp/0*$tPZ]!rׯ  t‹J »:I[-C26XQ{, Z(8{A$moBǪB g\GAx4# rWPz(I:8ՃW0,z맢o5ȋvhO?IMc[?V2<󓞽hp;g[{m{BNAD}Oda>25txbz!8yQl :~=un]=j-A]؋h$G?j/x Kq`aֱq_;h,RJozٵX)mV?s=s!Of=n@ 7tƛ딈IlB7 [!]j{tUrM̪}ӟ/vh  ˭<OcX܄waU 8LS e!蕾v']<2NV-OAUsn׋_sڠZ{[xU2'ΰ6zaB7Aݽ*!1ćG `VR AĝD+K卵hS Ѿ.BLeZj'N <v@ά- VG,d>{ uD.Ye^{\},2霌HzjS;Mؚե[t>3 n }v0*{zSDpI5+()]t)U\,gSaM, PwV~ѢjLcSOH"o16~ma= %4 ʄn)aL2K|?WQ5!J Q"k8wp¿tm=AWY:p,5?v)\U=?yC:dd]?5hXzfeURU_Jj 뼘zM[[۽ǓXnjIk.K9EcwM;ݹ<#D}H $ F]T-PdwhB'PCMQBƥQUoEG@h<0} c ~Ѵ6no1 +g̝7T[Ϝ8QSpo͇O<F=bۨ~b}DVx!=Ǵt8.x!zwatl͋АC}BA60pZUDž{9Hi?_=X  @JF1y 9V[h/Faqr毅C U F ENFC-TLF*7q8l=T(-n&=pFk|-}) 9,˚YՍSLr"%.N&E$b7/tT6ٓLUO|ʨ,>mYݏyPm_# jXޠ"BvX)\N8ֽG@rsCFP, @rn 1AO'K)=s2,4>Y}-0S'Y8CZnP!Ϲ2}w J#G"q#YnP ?a^(V/uSJp~@|*])_93_/I@˫$,cGgxa:u^RĶ^4+uM`4 V@"Xq6/3v99+tNqIõY6TҶUaLߋTœcwSV?:ne-v@ ԙDD~qߒ*PwZX<$;Zi0?>N';H=rчWsA AS":)=XHo#pwmNI( Ar!/t* ! DLWX]U'%ݔ_ZYs]'ganE22)2hq0hn"X˰; 1̲FmyܳDsp#n W}Ў7f۞ >9K1QV4Z9`Gr1*BEvadנ>0#w.:2CVLa-``R9K)ݞ:>ɯ5P .UWLnMmr,K2,,д86KK0ܱ0ro|y{9x=І :G:+DMZ ƶF2,ojx46,):e1,}34Lp>E@bSUs]<>@ZF%R{>x+yz~n2URuad}TcY݀M M:b*yt OygʂJzX틎ySݗ2jGB (Z =X*l^+ńԸ},ބHtL![oVY'm4X$>{k]Ї!N@i.\2g%+kIM uBJLτ!S""76Vf;Vcy:Eƛ;Myg.э+oZx̏BO(bd8; p^QU<18 Duȱz_|$ekiP-t\ڲzi^]"^ndosY-e ]Pgq<- w7;>qj^vԤ"{.蘭…ۘh 4}¦/53v8z+K䘥$^OfwWΙF&.N`ni7s-8v\>sޒNVC,sv)NtqL 0Y%wČs*h͖֬;Lo3%k+,izC~r.v:{`]EZֳl;ercuM޴h`VYIi6sEwC5d\㴼"u|noEbM:kC{.sTӅ_9ZO֚]6=gH5n,UuU;kqDVU <Ҹz;ꕯ~>i벇WM'Pq`%ikΞT$X?v8@F1m>%LQdngu{ka[7´vl[q{Mj_\煓c!ABõ05GQ$V'[׾]/mo;(1:5'{YGu༄N<<k=x9Z\oea ?Za*4;ypumYͺɆ>B.'5=T; O}vbTBzΊd9+>#cCX_ӱ <9]UP/xMScR=ZA,)Ў>\AoAd^G*>%9p>P0>'enwi!pUdj%Ԁ \s^ߜ/Q-p~#I'2@ׇoРB(>w皘j&a"P$I oUX2֑Q˨Uq!t\2PەR\)pen(ş94:nUNaXS*[@&vA_ iPVk~ejωl?oHZ>W>9] tPHb:ˢVdT|)Yh_͎Շ<žNAVT4{Af5 'TΈ6}mgo{¢?ΞD`|#?G-*%Id:E36yGecgG#s22.^ͭ+)($ȸ$*ɂ:z.zU 'Ξp|6('q9#>S`+Y-VѺ&M2$MI*r% y'5W?Mbp3)׹ʮTj6C_"o#g XGf?$?aNDLS,<&%Jd=; fLԿ2<'RQ1)_fAs,yPMZܮicv3Xu2VAf9Y 4(XnG26N~+_.-RICW̦V@DneZֲ蘆Jcy;(T7mjA"h;~A'U\sD}]2⛪e)B^[>br(|eYhL`揚ASѸ29Җ\0A(g[>P92ute# qwSvmVh)m&=sJ;\_l>ȫ-eijzI玆Zfɞ*4>X8t4 ˻> H!b/UHrF2x3Xta,ֻ_>Kg|!ӮAGm,ܲZqGmnq;؊t"\D0ǫ$RN]:=+1S-Lzc5)K&E߼rWĭ5a|S^p5f;3/_+>y2@]! WrtھOF.Fcr??vR:ڭM֎ [3֑*h^:|;.V}-k~6k Ae_\H2-bHrIDXFTNjN*G.tז&2FwohuSƚ&GbZL$IYT$ncOe^ӄ'Es0H/k׹5޵0{1dF~2-qH"8 X$z|hs d#SjJdJܜыx›>z_ w(|]7yYr/eE:4ϥawPGzeDG(#>:Z] ^!s#r}@ Є&;aod#*h,0eb8_TAu$ Q@~ǟ4z,uIΪ d3|k]CrU%vs5 aw[:ޢsuV|m/R9펹܎4$`Q^ ZsXȹdӽN2[m۵]$C;a¼_m,ŹD*Œ7L:aG€mxq2js1] sVNMia}/FE^aKK@,f UQa1\M7GGS\iTSp2Ņ _jsC2cl|so܄Q׮c1 q?ȷb'N6(~W:܄nD$wZ"JbzK'yh afW WIJ#Ds[1d3&%; @cI[?:P2Ar}#4>6  +e.-2>v7U:fZ zbxS1"!9E5| C3χ&r6Jvr_UBxPep^ÛbfvAmY.H{2&wk6T/~ui@Xfn=c2}ᝍ'wXyim=WH7u"; ս{`JEQj;]}9Q"I I/70Ki]c5288V#b597,!B_@U\]R sYv>Kf2Ѽ~]){e^Ѳ>YpWŮn*7C:\Բ>տ W.ثY!8'JBOk YZ