selinux-policy-35.5-3.oe2203 >  A bZK$fzVU4=[+R 'h.s^(g6|׳WT"@F}haݤOP I:0gA4>6lB)Ԣ8gRk\ B=΁v‘`@h4#c;d4/\CZ,0Ҕ~`#u BH>0QiesA>.m<*G.f$+UQmptS.X5fGwaARSb,Vl_ FNԣl2=5rgAm/o-P˸hc13c0b604dd5557687d3b3bf88f346a91e238061c38e80c452dd658eefa04c2ecd9b3edce0b1b3e875963d7422a6492e0049b40cJ9bZK$fhLrJ@Wչ8 l[`o8FO6* UH*R]ON8bHw/RYC/Yh6̒Ҽ{wt!ӄ+ V`퐋Xz(U`U#ع\MOl"%_- j@>Mr7b Z;pKX}I.v,>,+IXȪ*|^ޡM& [1ޯZf>pJ$?$d  <| (.5<@ d  v      u     $ Hp  q ()* 9+ V, d- l8 t 9 : >q@yDFG H I X Y \ ( ] L ^ b!^c"Id"e"f"l"t" u" v#z#B#T#X#p#t#x#~##Cselinux-policy35.53.oe2203SELinux policy configurationSELinux Base package for SELinux Reference Policy - modular.bNoerv-obs-worker-11bopenEuler:22.03 / openEuler_2203http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchif [ ! -s /etc/selinux/config ]; then echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 08FYA큤A큤AAbXIbNbNbYMbNbYra1bYMbR=54ee57ca013ee6cfd3052a3e4051319806114ea62ee7eb153236db6b936d39358a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-35.5-3.oe2203.src.rpmconfig(selinux-policy)selinux-policy     /bin/awk/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)35.5-3.oe22033.23.0.4-14.6.0-14.0-15.2-14.17.0/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0rm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null exit 0pcreselinux-policy-targeted3.12.1-74b@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@_cO_Z@_H__@^@^J^t@^p^j$@^ZR@lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57openEuler Buildteam - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch- add allow-systemd_machined_t-delete-userdbd-runtime-sock.patch- add allow-systemd-machined-create-userdbd-runtime-sock-file.patch- add add_userman_access_run_dir.patch- update selinux- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux/bin/sh/bin/sh/bin/sh/bin/shoerv-obs-worker-11 1659129522 35.5-3.oe220335.5-3.oe2203selinuxconfigselinuxmacros.selinux-policyselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03/openEuler_2203/68de8ad6feae43395be520c8bb0ce693-selinux-policycpioxz2noarch-openEuler-linux-gnudirectoryemptyUTF-8 Unicode textASCII textoooI_selinux-policy-targetedutf-8c8410c6bb394c4f59365bf770fe66f665f151cb07e1527439abe0e048ae432b3ecb1c1cfb518e333e999721743ba9eb2f5e9e5d6adebbc315b69afc272f15109?`7zXZ !#,f!] b2u jӫ`(y-Q}+n or̍A i7v 7-{uddfZگ a)jM-ZnUT$˛/Y*d[)+jS lbr/\Q]+,rjloEv7ljՄid#É҆fbF9@ȟ,&Ie;aHѺ?_%fa]%ӏ-ԑ*Ț1Hڥ,(N9`X@?AEZbjsHoTHi@tFsundMs~yI`Rh?c ,&DSKid $^&V;w,85}B#{af;<9~؁cKrBD'kNIƓ sf4tKU3\i#{T#t͚CSͻFAFuYReɻ%$VaѶC̴>?uc;&iƖo~tzƄH g119uplWxPiQFR㯺?KbjQzG2R08h(_A{I7IH @z9 +m͂2d<5CMH@⤙t]<9)BA5&y=_@GD0N_1;E4򡤗n`TOpt=l<+ }VO^Yeܛh { _k+Kݿbf<C5% ϭ7#t`xĚJ5_EԳ^Fgn-tj ءj \ a .`IY;$;T6DFРcfWRy7XxdY=qQB=ˑ+j+tv2_څpk?1\ҋ m!|3.A9-` jtVGþڱv_ CTX9s}aLOP08?ĹZۚDu`Jq?4Ov"BCkvrܡnP4f&3QEp = TBevvNhҋ̂7`/J)%nS[i5)HMqƗsQ{CY rJ;Nьzn4z6A B4b#VK{W4 +A@YNi薸wHh3-SFY=駞1y$-lڍ@ζ[mi3bjE%d/*Pȸ.x1"6S!Nf$2 <1hh9xpÇnq s;(BH]ǘ3ef@@?sr5KOerFd2[_+p' Ț}d4?RJ#SIKf \hq^zgv, e'<鍦=ITzܙ;؜6ݾty3d}*.&by :pd"1ea2LΘofwǪ}X^3s}Fz[dMXƅD@sg  >zR Ldo] ԀtcHKe$gm#XQmː6fJ';JWilQ%JC^p`IrGBRnxwZ>GF~\6=q8}vZYE7Dyc:[` !w/Ataݟ'R_XOmx_! 8L[YB8t))4Jq7ِx"׷ D+/1\TN$Y-{#|W(  ξ77Z Sb,؀Sj۞DקFAu:\%`!{w.iwXN=ʄֿ2G\c:t>0NKZ\7sY8O ܵOO]{#My*y05m"%'mb[ÇLQsxixC9&pM`|s5֋Bʴsnў2vsy_99"`?@}h$ edjY Q׳t9깁N=ӿۑ+X{FOGd5X,jbyfkA tshx _>}FhɿcKh j2hP=E/^a`x7Gc>>#x|VBH7?6"4 ve^Pפ |\(@\y -IjZ+P̡Vn1(SiAu- a.43Pa !"FO Ql!+m/Ӣi͚Jj>T'`W?B_SDo?J?g3S G62V>n }w!"PBh/d fۥn랁zZs1@Ko0jȡz[)fp]H ,9q1MI_ jw}1|c0hӡ/uUpҐ%œ5+ՏǃAx I~-E71L*MŞEn[O(͎4a4!f:AfP"G "XJPil%1}R\F.}E1ؼZm)z^|wbUmLޖr  I%ν_3g.S~c7lZfB@YX3UIAZ-\]yyXl 芤l`n̓?D2W_aYgWqs_/|iԆlKQp7c핂lFiKTkH,/ΙUkHdR 96YŞ: i蹙KdFi<s] Y3nP)jN(G [mFנUP柖;K2۾ŇPŷgs!սHX ,CL|zʯ^E.-ۖbjGJ8^n) Z9lk+omD-_I(dNIьQRyAfU5d&JmM 'RZ5Iq$j^i~8nxR KqҘ7ܴͯL:P:ň/sZi yoF*4׌_7V~csg0v!`NN&Qo|Gx?] EP]ԣWU 'uw$g)bA`qN˨W)rf8hLOwFno+6Kؘ&k^H!˗o1Hp{9i)JTjr}@_nq{))( wN7xalgͦ Cʟ2JCvwNg܉?zSqm qs T`|n"+Z? A\Y:eE@Ѳ2'(m;RC뮕jֳJ J=/b3H_G.@.v0~F#¹t\5b秿3OZJNa.DڍJ~֧kWi?@xGl;,YR,Imf #wƙ"/oO|T5qO6l-!~w-lwd "=LLԣs ;6y\ȩ+<EZ/Rk h_UQshkGt,!g%&<(I / ь؛i; rSVf[\HEÚ'jS.fĦ4FtAy+uַ\N3__́WW0ϋ] 'Su _ņu5BWk1NØ|4=H&Q+Ѧ|.b?~6;FDU{鳃_"RFAs_;?FѪ_lYG{ΒҶ1Y7~rF&ԿV~J(g۳ l4s!+Ƽ@/]Rr뀤WntÆ{!FE7t?F\m޲[ pSr]b[Wry KH~ uyG~8ŲAs4a7MamQwb%k3ܮoZf|)qyoEAs>)k3tteӳR l>9}Oq~JȩJƵP ({!+2#-]Iw.k\ ><償}_|^tΏƖ/+2yjIb9E:Ѩ"xј;FAë6jAAc'M2 ~b|zgXg#{XaI*" sd,Y+_ouޏ=[q2/`0#rU*=s[*ShV[d<.Z rY\lcrfXU!5bjf݃Ow;ApE`E! ֶnOpi P ʱڐmxpm(_U6T6wurfz;x/ 6ì:F?-'z ☛z%:pA]O8H+ 5>hp!&DYX7R'a`/`xYEQXNR"U,2^ D{nyCfJ?k#:NV@`83-Dʖ((e÷[ѴÃCoưvk<3_مwJ|p5gYˈwځPJ.7nzT2U攳(r<?a 25 h, ޒ;ͳ)N=(UPuag I cU][{qC7/x4>:gD)ʳF~I@aSO]=~1G:6lN˽%㫭R/%6V5eN\~&5tpR{IyN](4 ; c""Ozg %c0qtE1~"s9@G>U5ޔmպ=Pne~MF "2 kDE`q˒z*S&zpjQov6Ż66SC6ؐĊM=̪%1_"u%x~C`} ]w~^aERYj‚ ;Q֕0}FrTǼcI$t$.yB~ ꇃUʒx߷֣oKLjxjP+%̀QM<_#Ә-٬u_s\W]EN1{Wƈ,WK,5QwdF06zbnWp >`z~ILS1Ps1/&kNW.!kЈ'!勎9`0oS"YXԜ"ROx=znI+^{9&3w.~V>cIt~vw/P pvEYy ʚQ/ЙMOlN8ݥb}̮ʚw1d='"dQe5t 9vך7 fW9xV+-[ѥp;MEe`SVPF^ yr 7@ Z_A;ҲԈ<%˦<-䙘 qPԃXZ,tdÄ +X7x dH*pB{dNX)gh9ٞ"ofɲh%jK#'@`ݩKC L.xyp KsꈢE]eYzDd(yuM^ . f gZ!'r5{=+3CsKvbb n2#-+THaD ԩBxfQL STNe'\Ɔ=.lB+0M]˚loLYd,H6xembk)fA!#Lu>69p%AP B ϵw@C?ɏ-:Eutwr v@ ܛzWm[|*}p AA) aȷ6aֶaWGGќW6MM6 2O/ lQϵ3rC֭1[irQ BDN;& YZ