selinux-policy-35.5-6.oe2203 >  A bŗW^^f4r)R$[q(|-qaxz&$,cSVWck襄8@0Rܝ6%Y+-WKg=sZXмx;rKtvKJ _;ވ.qtf8lvbg;+N_oqBZpy GZ*sg{Dpکmʕ4A嘓r=7мйLlTQ Y̍мrV5ڃrvOH727cd7ea5a1d2250293ab4438fa06a8c3f1e80efb40b68414d7804f8565fb7abe643e2ea4aa4b76e06a9c42e309fb39d7b883382K bŗW^^fDIͦ_v-VM$綐ҹMx80hpS|mKDH\#ɪ2~Uk(nG4> 2>ɇYemd%I#\G9<&M!=y~bd]? x> z.br?kG5X*mHB aU QxzNBu%/ЄJ |gW+ =pJ#?#d  <| (.5<@ l           H   0 `  1 ( e) l* + , $- ,8 49 :>!@)D1FAGp H I XY\ ]$ ^ b c!d"2e"7f":l"<t"X u" v"z"""####"#d#hCselinux-policy35.56.oe2203SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.bobs-worker1640081563-aarch64-0020d`Huawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAbbbbbbbba1bb84a3cbec39cca4ffafab9576788d0ee71dac80929e76078d545924682a188ec8cd4a942ad7210d7f0368e49ddc09b7d26e5740957048b8ffc7218d86058e25592cd30e2ab5c62ac780bb01c9955c31ebbf4159af6ef5bf79dd01e5b5252845d58a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-35.5-6.oe2203.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)35.5-6.oe22033.23.0.4-14.6.0-14.0-15.2-14.17.0/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@_cO_Z@_H__@lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57openEuler Buildteam - 3.14.2-56steven - 3.14.2-55- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch- add allow-systemd_machined_t-delete-userdbd-runtime-sock.patch- add allow-systemd-machined-create-userdbd-runtime-sock-file.patch- add add_userman_access_run_dir.patch- update selinux- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch/bin/sh/bin/sh/bin/sh/bin/shobs-worker1640081563-aarch64-0020 1656288000 35.5-6.oe220335.5-6.oe2203 0-metadata_list-compact_tlv-selinux-policy-35.5-6.oe2203.noarch0-metadata_list-compact-selinux-policy-35.5-6.oe2203.noarchselinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/43514a305394cc83111c8d7c9d8f47c4-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUnicode text, UTF-8 textASCII textuQ%*e ]selinux-policy-targetedutf-8ba963a5d02000f6040c6e3a5cdfdb0055b5d1fed74721468e15ea7b8b087196f94adb7015bbb0baefcf2566ee3e6063f6cea2d619ddecac3a3758bd76d3b1039?`7zXZ !#,jc"F] b2u Q{LT/9dӴ,IWKHqcT>P T zP7))Zաd82/s ~b9F1`sb8g+` `FΌ? ee۹Dh^&x71޳z d,7Wl ',p|Wz[zƖW&M:C'dBT0ߘMqhq ogaoH8SbﯸP%0Wlk:j^kD6@~swLbF.\FՇNύDq/-D"' FRr:q f&҉EH 1GV(t4Kn[ >qeYL~Oo5iM#w439G-^٬BhM’77`aLwuԼ.XNH [&C'r1v0Kíq6TcT#,EIh`(x9x'ĎxnLS!c` ԔϹ~8j3Ao0 ?ᠽBWyGHTnO'O*# %J'= G 1BMmhP6}1<>ks#2i0~w#[asH N z5ѾPb()_a:[r5usW~U`9`uY;&赡>CǵlR>ȌR,oV5W([ř֓4E@*,9VJzOWd=~g}{nP4ڝ `'pxtBC OK,`awVmTP(]u:l9(2E[TmG4X-йڐ' <匳>Y$NcDmKn[_&ًʯ$`,P6_ύR7˟PՋ-_<8Z$J% l6^͉=Me1U<Ԭ9g /85YwYzjPf+90@TTMh63QٕABKG ځ)ٝ$ݬ)spf5So@õzz%<g&2XoGO"=F3O@ˡg!\ĕ`6Ɲho3 G>B|UJC}[\q8|O U ZPK20Gpct bVc,,Z\1Q)-[ @^@Et2RA<7WGL2ِ;+g²Z꟠fva7#9o[]{:BbZeU;vƹ%p "$ۭu拗 H[ $R4f( sN-j8gj@LĎ{,ZxBҭEy}u7b±zi9ʄ6{<&י );ySlt>m헼| Q굤fr^ͅdͥ"xEW{?xAJprBWWّ}ĿP  L/ږ15D2RKPX\ŠZ,%?YϢv1.JD0 =a̅6=,׽L^~꺤0ˡD}NKvʋ&uZ FΎ^wYZAw;U]Y7EbSm/ .RM~XDcƏ3`ȷs!ym:[\שEZvlp˂*0@M^slrD&%3z7WPւpzZc.oB(h8Ln@Xф?V5JN Qa*(D:`d Tv8 г>5 6r@fH TČgh[g47f2=WXN)o_[#A PLסOTжJ(#h3֪Dh9Ol*mZUL%Wdy_p͗„b^]/J &G1 i璩 mVqkKz›Kg;"c4Iޑ`"L@0~t}{e&@0c>i8 'Cܕ@qQnv*"@بtVQIfUf1Q` W4mBWv}?C/4LZN5iv%Tbb&:b"t LӚۢ?IgbbRG݈~5##Ef<ߠozDxρ>;SE2 >ɜ\,3HHDy5>iȎ2j<6Vg)ހ waX/&o?Eꨙւ9a~-\*aAB6YxPh=GkJ6SfGТ=][Ror ^}ir5b`Ӭ} Xx]2 IyM<ā pd9buP"q,ϛN0YPJ(U9M'\Rs]OE j#kD&i`/6缜!}9_hol'Mo?s +ዷOϻfϽ>uLp VZ0pT}?#[DZ50g'H"VN>F,C/"j<7l_*6r T~U$<~V~Ѫ m]2ko̤YZJr0UT}ПkmY>@g5)6}M[5n]OUrs4h~c$Jj닝,ۙBzr̯*ֹмைvW>jH{ܰKC<3_ [PeA^/Ih{ZcG6QTa#tq3uJuV1 'a&IidBT*'7'D; fި8~\:@&4(;.b+@_$.7W887``/.{R7e,e ^gx'L{׌t5"8jP-x6_R4V'ϑ['㎢^tb֜kզ,Wt8 |ia#pmNKgt&צiO% Ur]!^8>(@}T>xTड>z->8UcBMư#"^y }HgxG@ʕ9:4bOPƼ6FE}€#^&9Dc35=ʖo˶Tb.MFUI nzOrlDp,bƠ2罆ڞ o]hiθdv(*VJDЮD&J.nMIsjdz;mc$iI%isr=S<|% kBb+gh0{n}goFIAp`-$ҴA))GR$bQ ;m6&]yޤ;0w3Նh9p=LJ Bxi/W4B2eĘ58}JdԸfvo(ELPGn'Z+.:1?ι= גD(dEr($~iڶHN['bs)y\\73j7n(-ӹfxnjY;D$p7-" P[d@+aQ!On_x:P/w#Wݷ*pF8-& %F0%ptXd5v锹<^tI:s~zm%j@C9`quٍq0udIk&)yqw!DJ49+kP=^i9\D"MZs3!<,PLO "y 6q s涾R٪_HDg *ah y1}__i9::y@7tm`ՀW0dj0-z"g_c˫6 KxZ )@Vv춘gؘFo4! %/^ cIuܻgw5z)J3Ur=Fw7N&Yc]gޟs<*m(gSuEJfL"n^-Z4>:k>ڬKܐgd֑$vOV'"&Ø$w3^E(Du5V]Z_X` / !2KIX~Z@F~9>aԟ9͊ ZPËo*V.S]KjB*6ZzSx^NȾظV7JQt213I(myv#n~=x,OU?M[qVI{=h9QoIP7QQ*.)DL:t8:w[:)(KuFR,6iCcJ78=/)bdN=N"؟R&G &b u[2]U`2.Z!B4 b3Iv@V g Y V'e!s ]-~] Jua4}/%TjF}9m"(JHzUھX+nNya^fcr)X:$,(4(@X'Qځ8kZɓs)!l_,/kσ4chQ'%Ÿ'RAcP~ ^ 9&SLdʹl\dOwD2ԚǝQz֗=:egq5W/t~YeEt,t<v˒֖k&;89m,*~G7[5G¿hRjKK<'k'Jj0Jx Ay PhnY!lދ͊[m6T3IyS<<з$IQQm"Cٛ+ ;G>:#u {OV|"Bêa1#MBS%Mw }`n\T=^@Z$6ధ=y^$u kS@ ӵp`s9.Y(zd.X2m[XmrrG9M< 87 2i;R76ii=,4w DgJ2V5?׭^J}p}nSi KAa}&.%#q |"])D eLFa| E,_<܊m,x?SilVgwĩ&2MBGlP60yo0)%ϮM'r@XAle}ɠn_A+&Zq^JPBXֳ{q%!kQsbS[ N(1w8[݇8m'/0 gbr"RfAfmI.EOխhtY78T*tpwl^z.a}`mS :)j^"zWyoUXǘ _ $"tۚ/lK<|!ms\#B 2_wTEjH &`3H]Y7_O,~Bb)34d[4b"9ʓ|ZqDa\[tcRQP9޷ṣHݚ,7&Jנ9V ]- KX:Cu*aZL`2<)/G%96p=ÀrNmMr7/u'fˉ;Q" &] S I/2gkTχ.hot8_^^/ʂ.e",+e զ.<`Pv!v,0uNU!ͯo-CͶ p[_PXo@,i%cH܍R]E1,s ͘6ny;hLL eVGeKSeheE.yu )bܓr% [`C]}NQZb>ࣤǼǹtz^uiNfUJ)`ufFon ܑt0&azBD.eY@ٯbE/~7JԅAI[ޓY]uukMgӗcaqM$4-Ʉ:Suec8 ;'`67}pwfF37.֥xǴ"?KjO^=]tBd햺Fg0EQyOZrR,ʖj⹙*ȹhwklzTɆ!YgRP|Z +vՄ [D~Q7}4y*6*McC=sc%'K1ukREHCrik_:x Wu}fT=ҏ#H<uh1$Il$^,Q|Tg*ZFd'/>4~XBX<0u>^8q|LOP7z(zzepR=zq3nZ 5 v:nveVv:!S[u*{|oX  /3%܋2 =pFcf,}dZh/3ֻ^[ Vn?l-aãum;9Dj YZ