selinux-policy-38.33-2.red80> K KtĉH2!c31^ Wgf}support@red-soft.ru  WgRs%Y&"p[ʂ‹54{I _33ǾW`!P[%&1r _ttJSV _\΀Έٮp\Vx>ʡ1xPjY^oas=-mrMvO6|y)o"3#`:!" dMӧW@uͿݏJu&_L]-guaJb )>,rh-cq&y59e126ec53e99a7dcd808eb0cea21a90cc74b5450c6257b2c802dc84182a7cfa72fb7ff65244befb4ad4286e6c4352fa686e4afa3C')R䌱Rt5zi>Lq?ad  < EKR       $   L   V   `       <\()* +,-8 9H : >D?L@TD\Gd H I XY\< ]d ^ bd}eflt u vw( xP yx Cselinux-policy38.332.red80SELinux policy configurationSELinux core policy package. Originally based off of reference policy, the policy has been adjusted to provide support for RED OS.fmstapel80.red-soft.rudredosredsoftGPL-2.0-or-laterRED SOFTUnspecifiedhttps://github.com/fedora-selinux/selinux-policylinuxnoarch if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units selinux-check-proper-disable.service || : fi if [ ! -s /etc/selinux/config ]; then # # New install so we will default to targeted policy # echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. # See also: # https://docs.fedoraproject.org/en-US/quick-docs/getting-started-with-selinux/#getting-started-with-selinux-selinux-states-and-modes # # NOTE: In earlier RED OS kernel builds, SELINUX=disabled would also # fully disable SELinux during boot. If you need a system with SELinux # fully disabled instead of SELinux running with no policy loaded, you # need to pass selinux=0 to the kernel command line. You can use grubby # to persistently set the bootloader to boot with selinux=0: # # grubby --update-kernel ALL --args selinux=0 # # To revert back to SELinux enabled: # # grubby --update-kernel ALL --remove-args selinux # SELINUX=enforcing # SELINUXTYPE= can take one of these three values: # targeted - Targeted processes are protected, # minimum - Modification of targeted policy. Only selected processes are protected. # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux /usr/sbin/restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config fi exit 0 if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units selinux-check-proper-disable.service || : fi if [ $1 = 0 ]; then /usr/sbin/setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 0FYA큤A큤AAfnfmfmfofofmfof(Dfo/fnT937090d13dc93b26013f235a505d0b05a3a53e2ea5558fcdb0f2b2234441c160b3240fd7982059a65867f81ebab303d478bd1c29b1559bdcb2ba70781916b1ae8a0beca7f576064bfe85859d53e85dfc31157974115cac99b4e52ae31b77b185204d8eff92f95aac4df6c8122bc1505f468f3a901e5a4cc08940e0ede1938994Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-38.33-2.red80.src.rpmconfig(selinux-policy)rpm_macro(_file_context_file)rpm_macro(_file_context_file_pre)rpm_macro(_file_custom_defined_booleans)rpm_macro(_file_custom_defined_booleans_tmp)rpm_macro(_selinux_policy_version)rpm_macro(_selinux_store_path)rpm_macro(_selinux_store_policy_path)rpm_macro(selinux_modules_install)rpm_macro(selinux_modules_uninstall)rpm_macro(selinux_relabel_post)rpm_macro(selinux_relabel_pre)rpm_macro(selinux_requires)rpm_macro(selinux_set_booleans)rpm_macro(selinux_unset_booleans)selinux-policyselinux-policy-base      /bin/awk/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/sha512sumconfig(selinux-policy)policycoreutilsrpm-plugin-selinuxrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)selinux-policy-any38.33-2.red803.5-13.0.4-14.6.0-14.0-15.4.18-138.33-2.red804.18.2/usr/sbin/selinuxenabled && /usr/sbin/semodule -nB exit 0pcre2f@fU@f! @f e@e\e9@e ddgdd@Oleg Sviridov - 38.33-2Oleg Sviridov - 38.33-1Oleg Sviridov - 38.32-2Oleg Sviridov - 38.32-1Oleg Sviridov - 38.31-1Oleg Sviridov - 38.29-2Alexandr Subbotin - 0:38.29-1Vladislav Mitin - 0:3.14.5-54Anton Fadeev - 0:3.14.5-53Anton Fadeev - 0:3.14.5-52Anton Fadeev - 0:3.14.5-51- Allow qemu-ga read vm sysctls - Allow svirt_t read vm sysctls - Allow svirt_tcg_t read vm sysctls - Allow svirt_tcg_t map svirt_image_t files- Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on - Allow keyutils-dns-resolver connect to the system log service - dontaudit execmem for modemmanager - Allow alsa get attributes filesystems with extended attributes - Allow xdm_t read unconfined services state- Allow mongodb search nfs dir- update to 38.32 - Fix NM dispatcher script runing with dhcp-client - Dont audit winbind_rpcd_t write urandom - Dont audit winbind_t write urandom- update to 38.31- Allow cifs.upcall open accesses to user_tmp_t- Update to 38.29- add policy for ip-client- Fix RO_0004_allow_systemd_machined_userdbd_runtime_sock_files.patch - Enable daemons_enable_cluster_mode by default- Add watch, watch_sb, watch_mount to access_vector- Allow local_login_t and passwd_t getattr proc/bin/sh/bin/sh/bin/sh/bin/sh 38.33-2.red8038.33-2.red8038.33-2.red80 selinuxconfigselinuxmacros.selinux-policyselinux-check-proper-disable.serviceselinux-policy.confselinux-policyCOPYINGselinuxpackages/etc//etc/selinux//etc/sysconfig//usr/lib/rpm/macros.d//usr/lib/systemd/system//usr/lib/tmpfiles.d//usr/share/licenses//usr/share/licenses/selinux-policy//usr/share//usr/share/selinux/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -U_FORTIFY_SOURCE -Wp,-U_FORTIFY_SOURCE -Wp,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19noarch-redsoft-linux-gnudirectoryemptyUnicode text, UTF-8 textASCII textPPPPPPPPP P P P P Pselinux-policy-targetedutf-836cdb7180c8edd0f94b5768f9bd68a3f2065b1efd244a70f5cf2839b4e87c4b519c066503a4a4a91c8299d71a61abb2c5aa3a6ca43a3e2e76da09412353d8f1c?@(/hj\(@sCa7/e+bm~o[;A5@GJg_??@pC=1VYXxb,l!e]IH$ǙF" S64ٴ;a+۔$>"q4e# }B(v`AO! rcShH!ufikBn(5|d{֋ ] XB`41s^%}hu4e+_ 682V×jh*'f! 8T}҇0EP<&7 ~Xld#Wz'N +,aPh,u2, h0}viʾe0d2l}qln0 M"$ۉE5vk')'&TBYUR ^V_b ^p7F9}l[:tN Q  ,TQy"4[ NrW}gnVZd!cE`}ph"2xkO} 嵭LuLӃѝ`4 {% BSI4Y rz霔YXPXp?YC4sHCM_)}m3JCcmeP kIGXTbp,8:qPCy:$Cm'.զ:Uj°.jc5uU ˱88 *p8˱MqlT`vSOiL?w%#_ʴL\>uR뼋ZFvG_å1`K{7;ۊ I*Fo!a|-\#[[+H;0)[kF>vw9Sч$0D6+Y0sV8(*A􃤒yş8oØ-(UʾF1 x$ԔN125gC(=3:&.;zŰ_q!c8Q8V 51sQ& Mۿ&]=`35x=x,Skr!>vET9:Ye됐 wLLLzCx,w">ЂpK '7y߳ 2.FVkxQ+7O$y56R\8y= ӓdomBRTwG")ڕ Q:9YJkqb  1Nq, R($Ñ0 YR B% lI :P z{t&b6i}kv|g[ܖ \#0lb=-8sĜ&4L4WcK5ڈi_vA ݮм 3';Uf _Sws/TzZ)a4q$ʝ]bsUPD6(Λr8%=0/1oY8ϑU Qx ʛ؝}Y5/P%{KdNqeCfYLVQ9Q<9(4 o@D73ۜ(pG0*)#O2}ړe l*G[;+?I%X3u`8쒝֣̝\NpkeJuqg4Tׁm=lNeesvuBW}PRܛ&Fr6nX pL'4^5E zGؾ%#Cѳaruk俒@0DN4]XL3,t7P#LF;˷Ga+%h`Hx@[-5Y&zQwͷb__9I-W6Zq'W\ $dI/SI@1h6BU)>8UeKs{?:j/CxJe d-V}a$ -/?gmXI6Bǝ 51wE^FW:Xۭ jRs#) T9"h#%H7 0AKq5 )B$cDKge'ڨ!·,E_d]+lA` FRpt/[qg7]8\}d\cU-+mHmX.Eg$h Eo0X!3 y1*yMZNK'JfhE`n"T2Z<X8f&ntУ@qSB?I]s@.fk-/ ;a]Hądc]O ` 滠?40YʖT6Pâ>fShGZM֪† ']ƍ ZÏfFXbŒGdEE&RAO2y@N&̝1e7ώɘRn?kq3|ڮBlNPXJI&:?$v} %ۤGq6A5XSAUsy܇;j5.qqAIU.DX ɢÕ1Tݒ5v NS >[6uP-cJqQ{EVh z# q-7e>KSӯcB>9n#w93ֽdX:o҉7֚Ty,lo%.g@27$b Lچu45P~d x 4pE_w_7,P- pzCPx7.Wecd(w߅{3d٤>6BaG"eN48g$dQ3V#)QJ$x!$*%Q95|7KQ{)QߵxP{@>Px,ҏ9傅L7vwb␄zP05pG$ҹӐ&<qJL*1*I>WB&=oKuzpSs2vߕ%A y#> oSM?sL? EKrfe%bSC3N pJ|9$oŶR&CTN+pɋX^ÉӜ2Z?ExCcIp"yDFCo$Z-۴qv'E=[^vS*lDFHsY lVo;TFN|n"_Klu71ub_93n8Y)%rA $,(= c9 $wȁ9hUx m(7RH/ ;)t`nF,=C@YX f^cR1ci>T\5S̱52 m:@5 ҀEvĕR #?(=z]VsMcO/j^>žbQ.@vbӴ b㧑̛:'