selinux-policy-35.5-13.oe2203 >  A cQW^^f1? Kƀ|bDr)xd ϹT~5ǘGYV壗$.Q5k }ub^S0pv_( 79_t*-g'j16׌P85|*z2|BYڮ%]zdxJb_">!;VK8Qh7 $BP(jrT(27a9e70a40a7deb3a09ee4550eabb4cfb44cfc2d0904ddb0aa964ee6f8199a06b6a0fd06c2d73ca3afaa81fecbf436726c21f99cJcQW^^f6FhiۓB9Z+}D8Hh؟7 ޟI:>ZNƂ:eØ_U?[4s2 &MFL)GڡpJ#?#d  =| (.5<@ l           H   0 `  1 ( f) m* + , $- ,8 49 :>@DF G8 Hd I XY\ ] ^ b c!d"e"f"l"t"< u"h v"z"""""###H#LCselinux-policy35.513.oe2203SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.c'obs-worker-backend-test-x86-0009daHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 09FYA큤A큤AAc'c'c'c'c'c'c'c'a1c'c'bd8e68642dbf2cd096532c679a4d5953accc671fbdc41727203df477d5a9684738107de224abfa0332bdb6d09dea3b3b24383191eab76ed8bdad6450ccb55c1e183dd0688fed13f80ae620efb229a4dcd26888eaf8f31d9c711478febdcd44448a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-35.5-13.oe2203.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)35.5-13.oe22033.23.0.4-14.6.0-14.0-15.2-14.17.0/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch/bin/sh/bin/sh/bin/sh/bin/shobs-worker-backend-test-x86-0009 1663545600 35.5-13.oe220335.5-13.oe2203 0-metadata_list-compact_tlv-selinux-policy-35.5-13.oe2203.noarch0-metadata_list-compact-selinux-policy-35.5-13.oe2203.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/5de273453e14348e59c8fcb853770e54-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUnicode text, UTF-8 textASCII textV 6^ǴePselinux-policy-targetedutf-8d46ca453e4fb6492d64d615edae2c11a0d1afd4beab50bbd4f85f788057d0ad8278aaf60386637bb6b36fa9734f3f3bca3c83bf9034ddca7ea1341a63e01aa77?`7zXZ !#,jg"E] b2u Q{LUOnUx_sHb'"34?<.Vw6R$ǥvֲptJuK޷ۀ_M'؄oOqC5^ՏTnb7byN&> [h5JNTQDֈ P+_M}XK 1)ʴڵzjB`Dӄ`g~mN !B^oإmϝqMmr8U<,Y9M`+o^,YcYM'|MtW C'0m_8mcq:wwXva!lpM*eoןjEANuy:-vC<Z֟h?Kld_Ų06;x*20*C&ru?;r\U܂wEqTn&AUۜEl0arx Q,SNASEdGGPH@5Hùe_FfO!]t{Jl5V͠pHU&@y"=jbGGXp-8R#YѴ=<q BoSsJ\[U^Fw[}hxV0NOxԣv 5_܋6/\dӍ[2/́u𾘜$aXzp`R?h]==xsҸ)I;|@یj&%5UN *Yi{m9IXU A>6=u F"ulÇywn 9&u_u%;؝DF՗͢f\Ñ@\zH'(&yQvġY)_TRQc 6^0Ttq)X?z0ؖ9) C#]LE*aSY)c]$$d6ώ} f8a&Sf+-Ԥ>k4Ybz )dI49Mjli3r(f}:3q h+C L=VdՖ_PQi,l #Nv.6}}ݰ7_;N_Y깚`ybX5> KVH7ㄆ2"'q"ȵa"(ҼT IH{BB/J T$~V*`)M07pb$OAb nSQWm;o-lW 󲜔ݒc|PX$:䘶<> %P_"Dž_'DBp;F'&h v5qO#1~ m~m*\jSگKiW5 HuPk.h~f92R_GSOAPmj( !5~L:xiы SXpE~a5ލY 4|s]{V:)ҿ0T>@iKNNT7^,&slRt@@DGQ%i=Ş-ƛ Ҽa '{" Cwd3gk쬢s2LH='oLovu+UL~nH"W].ҶeX[7ԌI&H _%A[{5Zײ:I-;qW[AzU7Q)9.5ԨO"xXe}_xJk.QX9^=j2ɀ@񽌠K%bqapg? muB2?_\ ƭ^B~uzMAK hM9>*~:B?ܤE$HLXXڗz8 _{~),A힢m^"vQ[dx /kyrঁ`aQ/ N",$ʫ/n\"oD~e픢[?[_^I- I0V!CLA1Qf3$sU̫Yq%wrsᝎ Sof3[4~_"^%nDVAm@QPgћE a . W>Zޓv1p}S+*t:1ri<#FŴOn$-Sy/|AiU{ q^^,|'Y!`F`;aO%枧o"w*"Yɫ IVlS%B\ly&o{3k6$,oyhK,{Ie^VEl}Z&LrബŪx0d~~G86|S={Zɒ_c;aLcY\%ϯZ>S)vA8OG^b\w}H+B ;b2OKcd8!pNJ6xǒ[xܪL_>];r˦dH3x"{(ic悊}&(? S)a=_/taRᓰ~\9₋"i͸KlZn ʑ.p[ @8iFT-X \>ijPl QZ59 {O]ݓdƺs*8ɞƀˬ*黅'2 2&~*(W*V) CLt PӅt4]#_"2E'O734GnB_ݲK54[ɡGQM'8j9S89{j9FqiUxS^ -tÙ͠/D_=P+,Bcd^&O`eW . є ?L<=.o1~@a9G>tfj[9EY Kscdo0hcT8C%E`#6v! 0.z|b( lПLxJ7Tq)RZ C֡- Zz]:߷A Zt:Z\]jKۻtp ]"j6}ǴԿ6ߍEݴr+^1lhk:ⲪFB@ȹ|»ycN$*"P:]Ll!*)]*:d>Z?J4V@L@+t17/Re>t]z0U+q &p΄ѓ!"= $i>/| (|+ϥ~ms6sq@@Rfk΁ǾAcC 5FT(0LÍkqϫ)*MhUfl?9mq@\K:3T)L5ۑLN?BǏ4?a@Z []L(?dbדUZFoq Wѫ$H>'4 @ ng=+'je?$_.zׇ q(zQ2Qd*^1ϫ_WONlsӾg{m#|Br^'ZW{`j*PoSh1)?lz~%n>jP9JBM9}"]sx$0/B%(ǃ}@LǠ'5ǧ?s&cчEB #,{BQUWD7Ւӳms '$XA)e'%Ϝ~Htt-vfdIzwiQpC^6%h-)҅]fszm7$5TV}VT: ,/ ;-]#s~{Sj與t G&|+Fe=<{a[4*Ա.cP5̢Tںa%\l2# _>m;#`U6\w5L5܎x㉷^PG|RZƁyyzXpU傓&\7BE:ys̀$a5ʑN}bEsSZE9=B o~';:GHūEbf8N%I$$7 CbUaJn5.-5Iڣ@XQys,ܬc%$w̴ꨭ1 FHSFݸ6m$߈`Hq 5?[ &IZ1`+Ssqg̲A e1,_kWfi'Uu-fPE!JheH`]>@Ƅntҙc8:fDo5tNgһ4հ9wx^[U4TCG0$g 25Dć1N ۢM0jTr87n]er4W4(+ yEe Mn${ s`ObgsVy/N Ii~{LW8ySZK~dyU-yVϞQ N?BQNrC{2%1bpBMy~dJ *E/0M=HHg"G`>F m-r^Nw!3zSk.e˂>G=4;`Mz>4gLby{_;x[Yi2#X16VH<R$8IR0󉀈2*unHי0Z~d0v4' o`R3`=oHɄ7}³U"~$͓ɵKF'$w.Hh<K;(v@(x)E#N`y-ot!@_g^Q=3?++)Of]lߌEKw}lU?M -텭^h4U|LTmҀF:/='Aֹ߹8De#œ.XG03]ұ@=CV~ $ޜgD|E6a+)L2vzF\ē\4u*LD/N _iu}UK*2v!sej`fotSy¬Pz+[^.|E(?B/>+v fY9.˱i ھESRL3ɉ:ݮNг )j(ZV[_- Nl (^-);;]J>%w|n():"yOc w!6DMz?qr N/aĻRlT^On9g w80Z8Cb'R:ARk^F{u +x5 cww VNG4mXvn-0*E'X,< ?zy“`3ߋV"ؓ vf{$2pN[Z xmtG8h$pWpߏmhJ>8=ժX`>g{t. 0ft'5n0/0L9&'5WEpE^BmzkVBZYDuQ/n ަӏוzJ>VbꤒtQ((hNLij]"(z;_`ku,2KQ9π9gx4 @~I 09Ygh>l,͠FPlx~-n*5l9Y4]+9C# NH3 98WJ+bӯ; ƝlcK lJt_ИaTvɋn5̾#Z _\~g0 %BpB5=ja2_?c5 ,^ȧyBwaxE%0#rjzTѻ9T@ i`ԷFԉf''~oqUNeHLl rcpl>oWëٱXDYUJLX~{܋mJe>smXD-,|=x7M9CO:gұES 5jRd+Yb-94|{c#ڴl1Q4Om!J–趙9[yiS * @xn8#q /Vq|HS#g%w{H8S̄e{6}1H{Vw3y8통M'3!CE+<Q5h ڔ3-'9Nz"P,)6J ;&Vo_OQHy&`"ezUFjI*OP-Q1ۉ_,`^u.D Ġ[su߾(Y.x5@TTE;蓟6tYH [`4RȧbI4',ZE5?nR(Y+o5P7Y!kϹ*BW*TY+ ={seM thT2w lM{R*)*tk !VRwRʤr$ mg_ <<#.RT4fqR[uY%"pVz? :sƎ_=u~*_9S:*V(!^@0 mh2[J c2գIc@n_sF( 2;  .>PAE?Z !#LtE+ Lw:jAB?|w ڄ>#Dko|7vS?k9tAxYCj{n]?',P_Xӕ{Iu9#d;A4 ш}@ pzN܇Od)ZhPe.sX>2ꌑ߄])Z!>E z"X 3bPNG713`pMl@ V n( M?%\I7LN* y$8zKE؞}n'"P x.i_&FFݖS'`8f7k64;MܧA>wDܶ YZ