selinux-policy-sandbox-3.14.2-76.oe1 >  A a W^^fu&.!MްIX).W/VO}ݬ4v"wړ#|wDȘi()GNI~W>(2hK#^I~HKycH\B?$|2ԫἰkXzBP &|?\j姅٤` &^&#JVaG  C?>3uPajƌYnG_Uc))u"ZGOQr{\ƒ91d53f81ba84b575227c5bd8df72413ce4e9628a9de40e15afd837ac9e281f31e3a3e951402d8d187e0cbdefa4794d57b8970617Ba W^^ffm]Xvbi  2='Kq?iG4Wbz)X%Xmض{bM.{޳lCM4 PE UW%ďfDҗ9B0!q*{$8LKHp {% ~&-Y@Id`E;ᙌT46iB1aZ "%sa ^sJ * l! vm纔8 O xn'vʱ>WR>p@?d  ' > 6<CY    = @DINtxO(8$9 $: Y$>h?pFxGHIXY\]^bcd>eCfFlHtduhvlzmCselinux-policy-sandbox3.14.276.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagea$obs-worker-006QopenEuler:20.03:LTS:SP1 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qa=b73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-76.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-76.oe13.14.2-76.oe14.15.1a;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/shobs-worker-006 16285120363.14.2-76.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP1/standard_aarch64/4c5f412090f8136c51bb9c6e403b9279-selinux-policycpioxz2noarch-openEuler-linux-gnuKȜیutf-89e6b4efb85b9568fec202381b53f80e83c591e17c365f1039cfe21428c505e9a?7zXZ !#,R ?] b2u Q{LSekwG%jP^{#=I~&[ @ec{:ϒMP((ˌxaf|9u}XU0l6?u;R#]vYIi6,а cb,? r)/B:o>Tˊi YQ;h꧰ԻeBy 'y\]&ڷ)UtJ1iGWEyJ)~`p  :=$ K&Z) ˃èqyr^iCP8 4H: 0djH2:_[Bae|5-9z/185њXscd3sf9OI;][ % D^}MX6`{-l~4ۜ? x#nFyH|k\yiPU_Ky)Yc͘??G-Ŀy;Bhp-C z6fSԱr\eJt0Y#9rL9>M. o74ɬ4D:c50LD`|MWRuGUoK8WI)JRvE/۵cS͋J?'l>tbMq6+m-}t x_f{gߝ-] tQ(P21dzq|W޶Im>9MBhG3H[^D 87b#>Q2+ R-Nm{Fk !̜о|`>JMhj\T .xpz'$n&=Av%m0u\*,p.vA$nHoHzǙ>л]HRR ֘~7S ȃoܨXn+EivѲܓf7IR⍄]HpYTgŪ$)nf%|,RL#CRܨ LGH=Ch!nZhѓbNjp=#w!0 H3Zq 7Z| Ԑk-N܋*|aUoʓN&x P1mTkM"Df/9~Dԍ߂gNΐL/SOMI,;'kFY$Ոri y)}ʂ"/V2M^^;ƋEQďD-0ЧsG5Ckga<4.n U晤lٓv zkk S}/nGVB\t|;9%๲(ֶ?Q϶YVXh~j刊vr82 M<#sg,jU]Wo+ƭv.1.k5Z]=Y5 y`݄ƳLK20e`Q"4wWuK'(dVkf" : /C]fBIY^t@i1$BPKll1Qy4@3_M<(#@4ޑC@D0LpP?i6+rQp M=M FA %]JŖ8ܓzh;R xt5vˍ,8n6%$lj=Һl~k!3FYޤN1p5τC/ VuBbc(Q;70Ëq#kFt mf jyE'Se`e9d(yci5j]Z 4/%Vl5 'Bi85H$.ޢi4@tQ'N/Ё9RrDĻ˖T+V= ycly 1=""*s\zq&+rgzLuehGJԎjٙSМ<mo $A_K`7E%b:DYNQ"k L8vHT"٦L>RF8ZP.Zq,HZsb̞biHHcW L*-_TFXizA5GZ{=u%qÀ8y"Tz1\ǐL&YRvRIc26ܛOy%IO"Tb,٤OE 2`{gcCy:ˬ's -`bp:f9_R zm]dܘ3nWJqE'\j>еɒ;)eO@7?uMqx檒g0:4p =%7Mc,oղ20JELd)0L*f>'+NK,Y׹Fj1cVB5l7ë!wLDJQ׻JܳpƓ<ZXd7)ӥ#8r&ns򅫌/=E:nmXg QguMj+¦ux?^[?wRd5|sFC`r7 #`T?H7{neg'@c[Gd\Ǚ >W61yaf_!yaɁ,Ԋ1_{u?%IgD <Y7J"^[\'-7EG]fzkψ>-c z-q>,n:u^Y_gT"%^0zZdh[>*FL4l.jx==G5h=RF_'!LYjRoһPpH 3 Rw7Mq bkc/(iƽ采 ocW^_q8i,VÇM7j:D.z+@P 2_a0')ZE"@ǐZFfu:ho zBK뿋 - Syї9DK:i8c)nE}x?Y 3Eyjjf;:߯܇NJvjk٪YTSKj;Gw;"yo3$eG-|qqM4s̔mRb  p& uF_*h*evGEFsLDq:XYf>Ձ;`3i,8Xp] et}_Mcv/u\>@տqIE ?G#8BRÙq& h(aCZA*mk(ƭ"rﵻui6YqplН6tCaXݟ_(iջ 3xVq jjnu<xνNEOz5EƲqI31ưdLiN*P:!h8+KtTNe#//*l13j !a683mP~v{- Ux7@ߩ 93sBVZ|@G/l)=Ž&_$+g-%ϙ:>M`n[)?,5&KZ8lraX`9z["HN?kˏ4}缎5R/X[L&cș虂"YP +O9 L2))jqmXFUsfƐ)Yo8P>ϋ6|W䡦+@cGץg?b}gK^|O-#k$}%91=*=h5#'NO}'ggՈD&fmS qŹN=e"_JVIc!:.áu֌(Q0D3$b¢$.=޸5}qEz5ɭ{yBs^y ~Onߧ[ziBj1Z'D9}|M>4͍:Є "y-3x]ï$JSHG!$R 7?hjܾj ,iԈcݠDBs΍t++*2U\=%sde%esȲ=dȪa:-TA^p"` -mumԫȵDV,K պ ޘ`pogW?M7=hѷ,yK׉oN~sIE~l8D7FSNJ Eʌ6qɒ@GƩ*Dڇd=Cv7OCWJv_GnJKO|&c0=OdIc3M}G6ꕰn"!׊1b? B<[t$&7%vɀ6?9Xk֑$Gsf«x(9͜ r30I`|]O[G dIl04~l4)j)EծⱤ5PvMTc:gwШ[ I!UC=>1TuRp 吕H6[1{5o டK`NT١v.9K4R&SjpP?/@KOW_^0]grP6jѠ ʟ`ywy4JlHyaZi8n ^sZM3}ތʸ3ɇX,xc]4a:1Z,cߛ6ҩۑku d P 0k(5@Hŀ&/I{n?R=BgoyPBEkîsh؅lN(Y+_Ea 6j4GfD?h㲫3)qc-,V3tʡTؓ:d,O2GUnKD"H-#\յ3"VMt`I+|J>B1" pC^:XT'A$I}k~QZ>x|dğ}4>E';BZ:=4Ͱ6ʥ lˀ9祝t֢0ƕ|ѡX=Qˉn /vj}}՗h4kGК:ld{'G``k}ggx[ue?T@ǝTȏq!{ * dޜZq"P_Gu3tuZC~jsk{nlm`6/kl]gf)j9`= zZMxinβmUSW#k.ŧгV~i!Sn}3"zgeUfX*̯cM? }hΜ4!hdKC.n4@wT#-31%8F ѿF.!t^ŗ0}jAQ}.)5M]pj*}ZAba"S+;OftRw/iB?׋f ʖM7lSO,*%!yPǣ܉j6-ĒvJ|& 9%}>_FKJVVʋp,_Fy^kZبzk3ntU<Ճtmv#&7PW۲f12+_u QS^ZbC1k&bM H06øSUOttsn'5q3='(]SuP,Z!E5NI[U_ cA2{-iZ?\|dBhe 6[JZlPo\q :v?m]vǝ?!߈:S}ZHٶ/F q=/׆CXtS:0?iܕH4_Nq4v@" YZ