selinux-policy-35.5-14.oe2203 >  A cW^^f@7Ag)k:kF)|w]mXI;ص!9wZgYּ?jZ 4:SъrzXӣ-dH1rޕF\k-*s̏]eǒp\yw )W"׫6W( 8޸(Vv< [513eb380f577fe0e7aab2780db46a2ead09dfc4b157930a66783d17e20bd96cf1c6261a4748441c6221f944042143b1d6d2509bcJ]cW^^fRV|g7}V yq(k˄c @!)a<ѓ㔙 7k/a4.׋vʸD'G FPWMtꭺS9bBN³o:),Df%ng2:&63 i-T5!%cs~QLK3^YA1+kͳfjh>pJ# ?"d  =| (.5<@ l           H   0 `  1 ( f) m* + , $- ,8 49 :e>Z@bDjFzG H I X Y\4 ]` ^G b "c!"d!e!f!l!t! u! v"z"9"L"P"h"l"p"v""Cselinux-policy35.514.oe2203SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.cobs-worker-backend-test-x86-0009daHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 09FYA큤A큤AAcccccccca1ccccec9f53f1c670aef7c97ba72a3ec13c3a7304d175f053729ac10ed9ecc95f1f521684c3d1107076b6cf43bfd94289584fd37659bc3659ffa2c8e69b649f32e5941df467092c11d7e142a439a4defe5748d211d6a825a4ebc142487da1f617a28a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-35.5-14.oe2203.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)35.5-14.oe22033.23.0.4-14.6.0-14.0-15.2-14.17.0/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74cQ@c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5/bin/sh/bin/sh/bin/sh/bin/shobs-worker-backend-test-x86-0009 1669507200 35.5-14.oe220335.5-14.oe2203 0-metadata_list-compact_tlv-selinux-policy-35.5-14.oe2203.noarch0-metadata_list-compact-selinux-policy-35.5-14.oe2203.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/c05078f0521fd0d7c99bfb09865017a4-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUnicode text, UTF-8 textASCII textӶmv1 ]=f fselinux-policy-targetedutf-8c13a9237b266470dcb5d8853dc1ba014d86d7ca9baade999dc4fe3044cc758a562cb5633457a7ca944a801e02b2e991ba7d657af77ad84f69ed20a9ce42f587e?`7zXZ !#,jg"F] b2u Q{LUW2u:E;EvujT )^Fj2kw{Z 2 +;tRi"#sv DE3ZS(=k*Qp86l;A¤.5 i!v3 v۷xQC P?e#6q{?P5WJ .1+/f= @둪4ZGM793gc%6Tmo@/F̙=-\ 0zOAirV#?Nk^ha}]=Y|4 S̺H)k?L82%pXC* ȂPGM^Y)XiOWr˙_!l*I9sy} رFqBcLΦP<͍v1%2΋Kܙ$1 C>QrSz3t[#+Bݥhn8si V|S?|m,#q!df/m,y$$'(A÷-e ʂ A,6 Ln3ܯM"NvdUM}I&XVCO =#SH⎞oǿ=µi#0S!)@ liךx5pGtiLq==!Yı`ͳdwj<5@,C0L^PbX.jF#~ۚIES~njK%R6/!C0L0 ?"ILot=eRߗR1DsP(t~I7*-2 7xN4C@"Td=ӵD)q2_[*1RҘ 1ս 9Lpm$WmHiUlA$>b5$9j{F 焉ƅB6cJy֦z1‘ c7В#K6VZx4?ađ>d={zgv> aU6Sg|Z9om|GXٹ\ӷ/2ғV|Iw$Eqyue-ANC}˹`z꥚Oȭ˔ ֻAJyFȧl\+ ;_'qћH$UGSwɀ$Qk7X`QOGKH_ZJ OqlmbcY%fwOaVaA⽻ⴙi1Ta>QymX +vwMDfܧuiĺtr+)Iݯ^koߕ'9 hrUShj/)0 缠_*seqH/䇷w9} e.)&HO=NӴ0Ϛ"'\YO^GT%|ܱNR%[.wgMs0OOidKy{;^Kdgߣ꺲%"B!"3~xldl$aykEJш뺊GNxka.J gh~>xŠ~!*!"gQ;N,u bwELa,/\W:9\~F1hWS\<8^k؈ae%p % pl$ngEW (Ӄ֭$_X qrvU>2DǖĜ-3*XrbkasI $>D}4elٴ@GМ%a>7I \\*lx'\WjWPʅ`s3F4+ʀhpNF%MCpt^29d70G89>70?/wЀNg0@(r˲N-9&,?V/[TFoH>@d7L;Q4kmxXKR|٩'s86/',=Z(gbx^p}kvi׮6X(1=fNƜ]oGoe:aZ bo]Xhª GQYN8U҆Ef2\8Y r{j4^k'^]{S]wǜ]=M (nh`_6ҩ+eBM/.u>}wAn4m9km Jv=)8+'k׊T6ݴ ߢc/P92fA~@Usl! )8פ-S<6jƩސ8-6̷Oa$DB.SaUojܐ0ۇ(L d1ֳmIポ[ `ˠ[>R@v`б1iFR,A%r{r!kUf< s+ id/FJ;,rJuj28>AY9)>g1y*N%8`R||̼;lq^hW 43 /滸@"hhL//P, Rn c-~$]R@|p-/ݓmO1bT:B ʘ_>J3l(ޞRTD7[ݟɜ*ҭLD Yr{}Ս?r\itN4 #k6;ZDSJ*FFK7Z8ȬE!}n#\-{Dmm" tiF/z, K.@? 27꾢Q17$-EK, p>)p^wH-w"D;0btoIX,L@jpl }짯샵91YL4kR0O=8fwDKtIAQhֶ| vJP+c >zϜdȠN}[XxE 4&#N~0ݒ6OrdШ_0;ѕ1a<\ugCg@ NVɲoFaa NC8B+OC]_+zdhM-Kyvf[7 ;pQ`mEA.U& V(צ~:n3O{FsXm)Emtg?5A-%f fk~1ia bF^L/s/BK+{)x L}#PyDv^:ziY|F0_ <E[Kc gIGOׁQhZL$vLZ4n*:!) \t߿zd[ҲՐYa<*ftC d.:'j(~dOc2 d ;_@g3Hl(i;MWë1iZ0 Y / xF9L7|\IDEby{Vq2UnߜlCmxhU? 쿳RS!uT %q}`z43ə3&ߦk%zNĉ #w\gvPWRsXi(g-gs̫ʜF  lL8X_V.e]z1W3"e|3<FvbR1 ʼnԙTiup:&,s9""W6\7Ԅa;anfqv2$G[@rJ t RZ߀t e[(`{? 촺 T|хDK&k fOs v}5!n=0Ǯ.'1H|f4D1.86Zޔӂié[\ LQWW~\X3/7=\T[pC"%|p'd.u.UGq4KO||D$9tK6x%^i.ZůtR`B*`jpmTsDmw}v!U.![N[@,!,CibWiA`WOs*ve,6"}eõ ~$!| kO0lROl_&+?Ԁ,na0E"'qmt=F畷XQ.aNtDRZ_Q4Axs=?AKa]3EjNFK|ߞUg4I]uo.SmW䉦~:۸2_%ͣM&2@mdn7J,HO`t'4UoSuy #V$~RLόNYJ(Z[%;rk|,qx%+KCڬrfHr~pk@=?^Ƹ 9}B*ھ1+yشCpCdyy}iW`k{T/aW@xi\%7iPNlp/>F2Cd\pR4.*=ERun;凘fOw,3[V(V}dc+B[s[R~jSIΥ0.fs8!Dh[ Euo6%m&}Mڏ0tÐ[j=7 x[yu7({QWU깼{0YE*iD=b#bKVunܻ#_Wj+KC_G<VȸݐlDdXvs:)v)*y]0{ W'rSaʕni %uQ6]A .ywmv.Ƿ/BY4XW;dRMt~g5O-"rBNUZ(r*~ U["q3I4LN0swgG;AԽC|ds(YZs6 ,F@yYLC.T^}㒴tQ?0'xtJՋYUG$d)i.OS nSs!FLdYM&pRQya϶(K0.Ui(:Gō2F]MR7Sv:6?eT'aG=odt8L@.n,h7;v ?ccRK TЬ݋% `h1n3x_ 7tz =0_~B:!Bd qqA?x c=v?ZOݻ g!#Ƨ>|W":۱!J}7a_0EF`tv՝5D *Oi5L*;Ge|v0IkOLh PHJ9t3UI "9gi4c臭t40Cnk}H{ډڻZGLeω '[Q7G:Jw:R5M`H7v~B=#a=/z_D;k_oMJej730W}w/7쓜quN|K_diwN8l7B6}+*_SnSP8R}'.g$?K]5vjFLܱ(bnt2F0ӥ燊=?a ]sz%EH':1=ffmz\?'!>u-̋]H']=(jsuw*|L9jߤNfәPd26Zp+f$BRГ+I*}6Fbxm_3f+R6znb,bPiO{gHJBRHsy, ǏCh-<5It׈,-V~VfDO(-Oopw^H`X-63%e]NqS$!L(uxO,&xBg$/!HFʧnc+Y B [!߿^3ٱgh-egXLe%L2 ml2 ..ѹV2q[ zHY )(f&z{~H>jUۇPʃ'tMLAJ :Ʃ%U([ @m[O+Qy oT}?#ah$B!概25v5 Ԍp h ;n>: =aw] -{t |_P]=蛂JHadM-e ֯.Ivҧӽ& ev]7c.[:ƤF]m5 b&h.Gl6zo ywt5ު 8UeAd`H胷&:B<ȁPkoFe}$;,HQ':}=jU8`T9H-!\ru}fDԣ!ub:TV'42eV