selinux-policy-sandbox-3.14.2-76.oe1 >  A a!.W^^fRXTO6a]z`G=,ez5-t?pq E6wzlκWM.n4J]W8}/h\i^ #YBkwtc)DÏd~dp@?d  ' > 9?F\    A DHMRx|S(8$9$$: ]$>l?tF|GHIXY\]^bcdZe_fbldtuvzCselinux-policy-sandbox3.14.276.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagea 5ecs-obsworker-206QopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qa Ib73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-76.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-76.oe13.14.2-76.oe14.15.1a;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/shecs-obsworker-206 16285123093.14.2-76.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/4c5f412090f8136c51bb9c6e403b9279-selinux-policycpioxz2noarch-openEuler-linux-gnuTӷݴ ]5xwutf-8fecd9af291e7e17a89e502a752673be7c7cdbea9242623401ea27f224c4d7e0d?7zXZ !#,R >] b2u Q{LSқyN)`N*lsduSNU4ƯJ\e܄ ԟ w_O#" KdT7k)Bil(){i67kݷɹ`goBg Nt..;SqSWE!%%J :b2M#d"e gM:])qmSgh:=ꨦ!<,El2GGaS)Wf8~_e'r))I&*ί:[P~_>Ds3tM5Jq34j[ c)>Gij"_luOJ?%|NPd(g?U1[u67w_-p@$qlrK,R,-h1sd4?ƂьQGF˗ l!{  ĹasR5)CpqZڕ:"_, : ZqR3A`MMrRM? dRT{A"BUx-)eBJ,B઴ 7+ 4lvº0C-^bW'&CM|@Go`HZ W_}tDޅLL6EPNZ~2e>o>!, .~D&75( >80rC=GAx-Ϻ@W{Wu(huu>ƵZGRWiw>N|~xͯ֬ _`];vI\]B(?/#ߩN.]mMzEVUv(<9߽w+OGV|qP>>9AY YvVMf6VrN*Дp3_MkL^? M:UGy,r*mc~PSSqovnxG^bfL@9<`tx[NF#nTJkjӅhHv Ȓ_ˈ ?ͿJT[$H1*I:)/iJ|1)'%DQw~u|)E)YP*J%"<=p}HN%c/yZ[|Ǖ D.) w`-SrسsecZszPV[6QRѮU3U+v\,Ƭ|#9\''`0pϭ~2P5,j>T9gHęMVEke "Q!`-)CX=0[Ўx ah}"E˨uItڥ]2ςBL+?ۉqJsgf A<+^bLtfp<y`8sÎ4D(Yi;eg6Of\bl1G1҄'A+В!~TSN Q2jxR4sCSZYvN{A dfƻYesr\䈒9qEMS0̶ j XׯΌ~_rmM2x[v#qPyq;CI<3m]?Sc !1]:)C Mzx&;+[}F&Qc>%D4`m _Ȣ-Yq\絒8:$+ zڴ*۽~DCƤ kƪ 7>v5nlc9Z ~X]JʭC*lyxGۻ _uJ^IxrHsg_ODݯnK+a~@1CmR~ v((yJ3Yv*%j(tdU_NcA]S^o~_1t%z\p9`J(p0MXHNUFwphm/a :0RT]➼Y6u 6BXƗXt0H|JX4k*qhwgBjRzl?憴hBd]M"uҘ޺ոeoS'خQޙ`rY#$%i_3VA n|ߵ Tg޽<ԇΏ dk.*KZ X䯞g-ݺy_O `:Nim I ;Wt L$gyN- WgJJ$&ys;8MA@<ݛo|t%qYGe95R*>]?tMzLS-[kO=o ]0[0`@ͽBܷ":x\.[R0elo'Gּka]KBjk;?&5IZIeh,.+[ wwR^.pdP~,/*Afe8(r/@^n 2}ĄsS Uws%;d9oGSexp:p& ReRrO+M9ŵ9 z‹J>e/>&/UUa8nYLբ1dǗ8l6QbI4k,{`9Ll S9ZoΊgi{|' nI\g `uC t;S uwQPCVh0(S0~V4Ze4}]'|L}%b* ?^{t?+@nۂᬵA ԰uַÚ9gy x MSHmIBgݍKK ʂM/_TJe:= Gl^e?H‘[&ӃLPHG춮^#)\A;>pqR"% opC4$ɹDܿI׈yg44$xe# *%WA?X'ܐ}@5Di;Jod pD'Rk>6d& 1BYi&ۓةB}3*<^99ʯ%B(.c 8z7rE$s&ب\tׇ~3x kУ=NV}KU)]nUL3d05a_xHO3_ϋ$3|c:p֔P1n-c^ªܓvmc?8Nyn~l]éH\FGjOv\2]ɐ)zњsu$pdpIN> õiͭ2஍ zhXWQն#%,Fd/r unH7~9"~+ۢK:[(0[kJKqDm!wl0*^3mvzUyݑS/rD[k!_wk$?8e{R& Z@]˪'!*NspW?ƝۨzXlje4QZPpIJ&+3+G9?8s0jHDYȌ '}uj%CVJHS[ħ1};$F0On>J e9xydVːV)B쇪eۀcOYhv膥)h\_u٨Gn RѸjb^MeFQ quY9R?og 3ɴ.&qkNen%:ඉҔ?\).( #h>Rx^,b_3wô~͕N!-Ig[ɫ0f:>MjaR3@mJP28eV5i-{xb)tx$O-0k\G-'}p=.9 7UY@";t,Q!u0F7)Z8mƌN"oOE"'F9ETu 5> xt=+~mwlJAvQ_]ءL-q`'u|Jak 8_٣'.D(zZC :6c$ >|jeYjv<#pxX[d(s= O\?>:!~YUdA= B՟"cՉN۷l3Rp$''GJ\Ą[Ǘtin Ϋ;K:,/41g]VlT6ہo9ݢV]7w&zJP/@VCPW~vx Qk# ހu6[LZ?:Xqo֎)KVxxt=²0Yߜ|ًPlg~,Cz漕8?3V.-2RI#X:8ٱUH>`@07.1"m SrB3[gohK0NHVhx*9vVBC>,dU. L<o>9b޼hꜹ ,8XCUvKh1DenoG) OG7)1q=n%8h a1h]woh"4HzRkzۯ eroNU`{b(h6;(M3EuŸ},Js~ii I.姯mpc{>y?""eu1}I/-zP7IsԾW/ BS{a7)͇FQTR~%gmt<̳ xoqE)nDƒ\Z:kķmA85f$c i,I N鱄 ZaSCL_j\8ŕC8zߪ-bXSz%FysHh :w Q'|v!apw<J'9C&eҼS-FRZ@9ZفR~uspa?,<(/S'3zw#͒uD 8GxPͽvavL-F=вnR;_ ۯNJGȢȸH$@Z:a99>Zu/;X\r\ p5|b`[#^gf:TŚu3E~'7AӖ ښa8NƲIi14޷XapJ "h96r9ϒIv4kk k]X:$?C4X툙- L"W_ry]aS0:d< pUm:ZfV]bL +vqs%[41t*l9g#iЁ4֍!+-'?~FmWՌU3SMYhYF:o;giT'@n YZ