selinux-policy-35.5-15.oe2203 >  A cۃW^^fWt5醭$8JgXa2eRDE tZ$.>'!3FWuE˿L3]@bF;[[t!FKŭ`&`!zqh:@s;x.r%<7lXӋ| H@Z؄pJ#q?#ad  =| 06=DH t          $ P   8 h  9 ( n) u* + , ,- 48 <9 :>@DFG HL Ix XY\ ] ^ b c!d!e!f!l!t" u"< v"hz"""""""## Cselinux-policy35.515.oe2203SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.cobs-worker1640081563-aarch64-0011.novalocaldaHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 09FYA큤A큤AAcccccccca1ccb8f29a93cce10e57df0c1e2e07584da0c208cb1ecec7bf3bbc4ca4157fc45eceed02f800f543ce16679973116c8fefaa38719520c5e9decd5507334f965e6da73ec980fa4108f6d40f2020bdd5f5ce778bbf97b1bc21504a9da16723ad191ff58a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-35.5-15.oe2203.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)35.5-15.oe22033.23.0.4-14.6.0-14.0-15.2-14.17.0/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74c:@cQ@c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$lujie - 35.5-15lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62- modify the patch name for the problem of vendor hard code- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5/bin/sh/bin/sh/bin/sh/bin/shobs-worker1640081563-aarch64-0011.novalocal 1670025600 35.5-15.oe220335.5-15.oe2203 0-metadata_list-compact_tlv-selinux-policy-35.5-15.oe2203.noarch0-metadata_list-compact-selinux-policy-35.5-15.oe2203.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/ecece2f12c5fc11ba498c5810e205b94-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUnicode text, UTF-8 textASCII textCڸ\xRselinux-policy-targetedutf-8b6c54923dfb622bc91f507dab7d5205ca0ce741608b7595fddbc48a4cc8cc62c98a51e7dd98360e919c0011d8e5feaef701003a9668226a4ad1e5a594fb4a7f1?`7zXZ !#,jg"C] b2u Q{LUW4 v{aXd4y36|qKȹfթVpDDq E qdf\Ͻ9U|FJ5歨>lִlՠ?i+cv:Vu6A>s}wpab#,Qj3hBF~qkpH~\:ۂ*v%Vk~XNLz:5?g-dt+=%ptlG 4ɻmcy]mnR-( m+=h!]TAY?⁛a~5asgW,X ӂZtsAS'q\tc2␟$vINo6of<84e)0&rYtȥVlkSfJ㴹ԦZ(e^XFh4QI3FFPʓj8g[+U񩚱=g2oJ`&ZMs!qST~R`{>m675PcЦ+tzjKC.GaN#5AW^DR26:YZu>a9 TQYxq6A` 3o scݼ\tH=XnnkSs=~o&"Vq" XYgnڇդh Mv[DHQ w]!N(;e-U~IiరT9> \ 9][!̊,XIΨɨZi2u1"N((&}v ئ(?64_pe$B64Hs44 n\4ɟaefUճmC,7Z7' o8wC2z[ڛ{J/&y5'BMɓ]GJ[J? *KR"W<"?H'0D6\(RՏ[OyS칩k R4 fQDo~aL+FsGh:':< F NK YddQtLU5I aٙμm[2/c KUj5π{!%+^Rq]*]eTAPopFi|`#y<;A1 aOtBG.%B_Lu{<-\<.4FL :AWooOs1Stdi+SX׃J9 Z*w&A\4(J%*N=balvWCq(]VAE59g)XlF٦+&I 5$BH)o.lpt%. ڶD> aE ]#wP#C}P\QVz?_{[||O|IE7krҔB%B4+.oO%WI 7:y_sIk,$P 0XO%Z^{ڞ H&qV8jDnui: cE^wi\<.cj[kG1 DG^A9Is΢OXF%tc>pźt|}cTS;#.{Pިцglߺr9NSyGh{YA:4T@=6KL Xmbr>8Țۍn:OCnn:ՇRԆ$K݀:'~:3 o jSVvcyj힏DRc &ܥ]Ev{WA1vdH(!A7_ݛVwyj:O6YzQk?qhiyawT Xp ]%eJk6 FrDf&Q:B_Z V+ke.&34!bYpz+SH%hjk7}==AAJ\$<)eT[Cb]o=1)q T=`ΧnNP +y>!XHRXɁz(5C4nZ7mG1]i̽78Q/a~I4+@dmZQ[M|q gm%[f<*TTZ+.ˠ `(خ$a[n:*&UW-!F5//v…`2w5T.RB r8i~1b}~ti6Y\ldYkئ"_Vzӫ+ʃRV ?];xܐ$Tm$H2WDŽ) DR|9Y~(FS2.'Ո@f 9 ʗ;JI(CSXc G}\A LnounN}O0ZL\ kB4(RDbZၝfTgQd\NL=#fn5Ԑ/ğ^{ ]kQX옕֕,%`> ?;܃1w/AiH# !RSK [F%ń!de& h1Ymtq>6xJVq )Tr&^KÜ*:iS|z } LU~y> afr_Y%&7)\½lB*η8~D/rލ}` V)fSxd6[iO)C @1/it E*x. *cv#JbcqVY)QfrZ^34`ʓiP=I-G?pf&^Q)D&Q gNИ!̺ I+5I%oT˛WmcŮ-ʊ&ALW3۱8b$ؤEON6} ,;ce`-r6VGЮ܎ 7-b)d ϑȈ9~srxS@*>:R7TۣSøsXUC>}#DSjf0dgZC: ]wu1}4 D!cLa;ʰ˸[\'(bm52mxXwHZ謫~T #s[q.^N :~D >hJ EH LIJY0;$AZQT'ygjifI@dj7ps&AOF+ A,Xԁ9ε.# Fp BcORYu:'UuaSnjrU%6 n 9ؔSDĮ!1C6ИpC?/XQ,oy`K VbgjiBрe Pb"JпheDPȲJ)w";7D{)b1YMXEK|#.[mmɝ Szz\l~WF5-3R3nr5ӄVD'.\C  !6o%Wk;<8F7Ԩu.8=E~{eK0FCs9msnz6$ 1O,A@X!HcP04H:&iS=Ж)5sS/_w@Mt9IJkESfvga @'Z(4'r+-iRe xœr6cfTR0a %~C!a)`{RmO0^݁p #Z4z^V6iGhm˶v_X2#^5ƺŰ,dTVFЉ ‡g|+v;_=3cL|EL\[)Rp}tj`Do>7*?[@S-IPӆӴṚU:& "_c[>|z PxʃT{qg-Xż c' YB-fTX |A̴<3l7Kf\ZU MBd?[r.)0|R/ 8I]]ξ`^N@{֕=I::Sy*XN0PLzB&Bt cf[&ӳp>%{OT{8?V$ƯĊw7] _2s BI);3=~-lfAyhqD@n=hܛ]᜞Fw#׃)וֹVM@S};ZoEҬ8L셊mnu00&Ay]W"ץ1-$d57u* M we{vr|er A[1>l*x&1{6I,S J",)RC"I!RD*!Dp ٓNW+ؙ)ԤVw^p:Ŋ0[#4-5QcaFt~R.6 Y+G :y0j9%Ab80@qc-EEj*QRq5Օf2fK| ϔƟj3ɂYAtGq,t$EzEcigNg!؅yN@qgؠVfߥ5')~75;q-c|U`{ǘX }{|'e[8l萳6q-IwuuWs,sS!YV}Ĕ:_OyvxēG i"XcGyI%ňP(M>MiLZ+IH B/8uq@'0CZ6eX rC,:]Ro}D?I=;*ӄ7XbYu& VQw4:es_˥F#L2sk, K1 .0M(? Sè [H4 (Ex0%-A.w_3A :rbWl& |7%>b42t9.+1Z  @h/4]Yau%rϞ  3MKRccԱ-p-N֎&F[Tg'bQӼ2®qHB<^+(Wniy> ;Kib gN`Ӣh/vK4>zGΰG_L+VjN(Ǣ g] `LY!uը.:[Qg\bUؠ0rI1Īb:8Ӡd#­n*ʣ,Ef4ZPC!0M3MsR\o2EL/t+;R'BeSr258pHG2|Ho|b֦ lCiuא3P'hL[( dR3w.o";m&C!k0;V)zf a\NbvSb Dw;z U6AEr٧aFq=$k KNZ >Iy]4> 4`ը>8K+uk|T pV}U9h𺤹.WFGU}}{5-s\L|)=@0X&F처_?5!U*;|loR}F ?)ZW؆NoQP 1^{Дj-C앩LmJ #h 5U m V6bB{a1{:5Q2ϣpo.iҴrtrp u93,>u#3N -/K{h58P;Ԛrã]8Cj4gTL<01i"2uVYnd/]Fg"Bl|JM}J&RpkMG|W- Bu.$n_{/$"J ݫ> -zDΒ)~B%* ;^j=9a I5 AJh5&1:r9ͥ\}(qLwPP>.8&cQ֘ o8דC#4~ktRXG:FeTvnCEym?;p5 nxaR[$Nks:8#z݅pQS=jO#x3X4HKa k~ 恽>3j Fә yVne89`zձ}zMվ-(H"xQfQ}Gׇi$ο;DX1RX=a$(Reauv ^z~(¥^P5k=JDžM9SweM~4l#XCoUM%/&#}d_n?'M@  yi;ڱD eBPY2=h7lb_v3)+Gq7:9@lGNn#p9/C^a=iE*[m0Io!k@qԒRf M)EiYe .b9>tke8'FW<0eOҁnj"U޺XoT*~rAVg˪ϒ'oi|#,y^UqsW_ $}lҝP6{~[ SWP.Br˒+b}iĭiƜ a^2w4!&o3qZB}ك`_pf&ZYOD YZ