selinux-policy-sandbox-3.14.2-78.oe1 >  A bǥW^^f?̏*?zοQF)Z,V*8I''3e\b{ZF zq$a~oj'n n$`P27LEܕX T75]t<~FU kLk"iNҾsXhm?o,HM+z,uR='eKi.佐oO֘]WhmǕȲ@ԅQj4,koTJ___ vP?0e36c813bbd85823077680e95bf2383cd39274a27b999cc0fe977777aa7a9fd4dbf950915f80f70b37c7288dfd6d6d5356204910=bǥW^^f:9#ENʩ#AFˊ62oN@k~zxd"b3\ 73㓜| _Z]A#|"sm4ZS4pH٫Co5i6>Xt3FF~4TQVtO2ǻjj8nR>p@h?Xd  ' >  JPWm      Q TX]bc(89: k>?FGH I$X(Y,\<]@^Kbhc_defltuvz TCselinux-policy-sandbox3.14.278.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagebǤDobs-worker-backend-test-arm-0004QopenEuler:20.03:LTS:SP1 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0QbǤdb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-78.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-78.oe13.14.2-78.oe14.15.1baa;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@luhuaxin - 3.14.2-78gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55- allow httpd create files in /etc/httpd- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch/bin/sh/bin/shobs-worker-backend-test-arm-0004 16572508843.14.2-78.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP1/standard_aarch64/3a740848ce71482ff9940fa496c0a7af-selinux-policycpioxz2noarch-openEuler-linux-gnuN+Y +wutf-8647277635a30c2adf4ad6a05eeb95ead0b0c1cc8facac50024b37c80372b818e?7zXZ !#,R @] b2u Q{LT/trg`zYsFfR S2T~~7 D.Go)n {4z@`DUBERT d{av+Bl8@`VځiH4kK%5P46/ɍiJPKcCEs"ĀӼ5`*W ߗ6b볒g@: R S-,#/L&_ st= ⠑SD@:zr۠GT aHz 9?Ji/N{[V@nd٘}Xb__1E$ѥлMTME"aTReɀ=̈z8yk`:0} Ȃ{scgA'>[y-E9` /9BDX`:v\cҢ~ska[P% cD oO⤄C(տGY]rˮ娢p\V<;Jt`:&DQ( X !9:ɁDL%X7)# b@)f&C_7mع, D %J8ݗʬ]\[(E$3 EFzkh`%rWg٣W5 $<7k1a09<bҧIOd*$3ҭ:1;9d!>!ih(C 8y;;3J-QM#IK47ɒ@6u =n]vƕ4`m?D^t" )b#3 Ses % fR_0Md<5VQk>8ƴJ*7tKPUn꬈3tT^1^kͻkmZ7׋7YϹNpaG^LXG" G5O Tofe)!Q&}gR{Nf8RDyCW\Bɍ@sC. ڨ2͔[(S8' ͋o};>3@CQ+[FSz bt뫶qdLGϵ'f߾ch'xy⦒Na`2HH0IҚv:CfK5pj>>bb뾲ko-'4mF# \+,}>Lm#K SmNܞRx{iɘ~x?VyXKcgh~]r1( 6L8NޱvԻ!{ߧP' / zמxn]7 fe--ԑ&@31RF `-|镁 9G{JvNٹGYeȆ~ՐW8yZqg B{?lc (ry~)o4:Nlk j[/v ݊[?I/1Nf\,Owt`=C񉃭?00XC 5;94AK dE >4j{oX]5ȫb"[K=|k}zσyd%aU! fwg]է3Nٝ;ﺜMcUܲWjӔ p;`E0SeA R"SO:9{"i`rT ﳣ&&gx ^jˍǻp.ݛ2@Gd=ɗ16D[7%;!wA A֌ 9IQBzos,*3+_Wygȶ^< ~L-.@\UK7-9?4/ rʸi2D僭`,ZձbG]S' @Ԡ ѭ4i֝EZ`.ҡ5 xYK:8o0z[\x[,K;Ҁcw!=1#&ʿBTpa<TߣHLSdY,&ĵ=CF>dtҭ(H CH<reL6*B߈t2 Aw_|=] L\) n'Fq x/'/j bQ[Hʏ֓D05?|;Y[_+^%PU^3ѷX9TIKk,5QZ%x7kohR&=dxadr94*D3-xu ֶ'vn}T|ɣ"T~uFYrR043*[|Ho2y|h:]8r̂ڌEFeTh㞘4h&n"%qhZ/(mEAѼiU X6O0ۭu0$.:]2$M~$c(v}7A ^zՋe,t),tQysZIVŎL^c%{$$U>׏(?-e[e<|A\ \`R{dcǬM`ਗ਼ԙb^M`\0`і4Wm jG0cU8(vC1դt6P:FQulF. :\#=]qǛU1;7">U>ܥ8הT+3_ LC~ ,,R~e!ԛF7ΐVUÛhwN\5n^yzg\D tJ =S/mZ _ï͜[gŪ$$ߥ=P :l%BBv5n`#͖PWՐ;UhNG|\ C^o;pg .MV" GE6Xh>Uo^LBCUj9jn%=(&}!OPR :Q㬯mU{yCG-zO^ fMcU(n %;{ ݆0?ס$*JayI鐈-BآzO{$&r&t 챫fXa%暌/Bx?ǀkF"!s;ξ0 ZUF2#,N*!b_ݔhJDˡH{AL$`u9*g.ZA.%7%-BwpbU)֬)xͅ{s@}O" i0_z >X_ې7~5Q²m*[Zb5nt$ Qn !B/YS6 gi1Y=b'SP9 <ҫJ Al1=BAx _D7)eKu]*gHG/v+ |ye&z>XĴB|8 tba2ZՉKՖW ?Q BbG?rxI  {q$#=32W1j.5 U+^Ԡuƺ1ШF+w]Q.[6=JE ǟ] t#y|@=I<I:.=f n5smAˆcUִ,{ `Sx8әJ:b X&+Ƿ/BG2%IR-J||6OC)ދNi[+g0ǗB3X M5; 3Mܴ f#"9^p-_VsuS] +JU<\3'g+/{h<:꭪wSeጪ9H15{"1sVQοwN^ (_ΙПL+9biPn_b D8:By!֥’ȍ%_Q4aCiN||;3,!?Ld|!Io?w1[I1kn!uB^>yƮȠR^P.Iɍ|V hkuXMSrPB :G3kf"!g\PMݲ3lP9e51b|,+ eL1sow;wiG@9ʝڟсpr~KQ6ةȘvh&:v%>pHmtv|"(0|D9!٫&=  pMiA\u#p!6B@- ^aS_Lj%o/C*b/BNߋJ9F'4SBܤ@lj @qBݻ8MN!Zv3Js݆@ PmE3z&;T͙ḵK'O[%@yNm%I1[й1 S S3t/svNtY+^'ޫ1F5U;ȇG!yzSAC,zs=ЮPժcV})bf^XIwA1'"L`~v854i˭N]Ch.$ղ pVt4 w8(iiH9G0Žw ORzrYN!$I0b nK&! #/Ӹ$ ߈C]ຊHI| mb~QPCfmyjyEaUf}shμ@6}?s]>>!cP S4`pY ;\^V*qӎiMif'1Y\LNtV1e+z*ݬZHP0h(N&&p{m4ctr24@? YZ