selinux-policy-sandbox-3.14.2-77.oe1 >  A beW^^fߟ6j`9*`|0M!bBϳSň2%_J*<-?k^/䪗e*@ ̱8{ywNfw%)w[iȱn4)vBߝyZ`Pj EPH!OCXME%ǗM@IE[kXYI04\Ot /hxu]g P ѿ,,yZDqsLʒC8;R;oH KNdUɞ:{m@ w8(7ή3i0KmprpR}`]P Km :LɞORL1@jNdI%$Z'czٛR>p@?d  ' > BHOe    I LPUZ[(8!9 !: !>?"F*GHHLIPXTYX\h]l^wbcdef!l#t@uDvHzI\`fCselinux-policy-sandbox3.14.277.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packageb^ecs-obsworker-209QopenEuler:20.03:LTS:SP1:gpgcheck / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qbrb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-77.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-77.oe13.14.2-77.oe14.15.1aa;@`]`9@` @`@``,`_@`P`L@`B@`>(_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/shecs-obsworker-209 16547661743.14.2-77.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1:gpgcheck/standard_x86_64/458d41731169b95efcde890221c79e29-selinux-policy-3.14.2-77cpioxz2noarch-openEuler-linux-gnuW 1Autf-8f5999f6c3691a416f74022970b8805122d32e6338ef037a1ece87a5f5f82d271?7zXZ !#,R @] b2u Q{LT.gl?stWhhX$^-XoHZO$u+ߕ{ >je^4$r+_s<RŁZP%= h|>oP_TOmLAUڵK.@}WKFCPߖ9Ć@~⟵mڈS+NN07*pN'&/~?G7[ U$"1Yʠ ȗtzjm@( '!Cn$ T6cSiA.Q ~nYR@P7."!/u_k-&8r 7݊x-xCG+:NJ:LK'>#`pKoBH WA2 Y9>&}iܪZ里Ԓ@ d>'0&^8bhtB6+-2WV;}PElsny]^]9f '-QDvV>zMv&?<EƄ!MLr/kS8 ۍԦ҆jRq/8V(;4vtb 3ÂSL9b0r`Rba䀰r3(14:UAnϠkۀ"BSP5ϴfm-SxIAJ.y;rT,EK>MpĥT@xCA.@ =[XIEE.7ǤAyGi6^1^Iqr AE!^VX+*l&=v?nz^P #X`,5Y/CdoIc;̯VAY n*H($0~ɍCfm=$x9s$(1ͥR B b = ἧ513cle܍ ?g]0ѯQQ\꧚6?eZNJK8I@߆WK̻ꥺge#^'iz,0E!c1N`#@ 3}Zg!!mt|P'&杨99B[z*N'۞9~э\];m%s V ,(_adTM %aD2k~>תEĪ`WO?Kb=4?|#w. PkUApBk̿o 6J"/Q~BP|$Q 1_Z =F"Yw6&MO&ȾMD3?ALh? H(ԽU΢KJ XŶq n3ˇH}Ȋ +؅wpW2{OŤ>=80=V. qJg_dhȄzd&jRA}L}>Q)NBY!8u@X}dFF5sЇJ#: 2=(bצ.'Exg8|p&k~d :޽RglSJ1W>~~Nt8@nQ.2~Ɣ{95$ ue JJj γT? xvS;4<6AdI}fH`Ԙ/ds37 ҁż@1'#Wnuiv >Rpp(t}?rWcVKt/;ϟFNbϻ U7?ʝ9,`xY S=L&^J1y]v>ң0"fg[r 0:a1VɄdrZA^~菋WW 8 Cž29\ A\;#:)QyƂ5)n%% /si)d5TޞWY~0Hh@KN]:SKI|zɟ?qLOg7ȩ;s tN%l$Bz`c^_rvRNu=Σb`^DdDw$@,JrC}̎bBmb\Z ?yps`МQ>0 K B*3TN TO~8A& h(CQ `؝ ׇ &zb՟'eI.aqT^:x,iF;?#Q W$b7& 9Z62=-. bv"ކ b'HpzЏb0s˜0 ;dk7OkXv/-J#3l/\C]6 %5Tj^tɃow>21!]%z BZf 7j>޳ۀf{kiY jֽzQ e,Ct_N1i֪ٺ^]koхNwdPDnj&T[*b¿sJ޳oI|hC)Nmf18Lj<$df1s. /gLcI4\֪{)R$i,n hQs}vXm)js{bPv*hpM?-tdiowTm}Uj߮EVq)ӏkӨZe$q:@g G3 Tþ~ Ce7:o'}<+.Kblo\-ލkiMOU7N)nX  :2J@ zݭCSBvDs!{PJ:Ӭǔޞy; ;lr/9ux]+w\GIt[0zwB!P檪j M_'CDFJ.ޚe~'_ܤJA퇃$?M#2ɩNZVT( c}m$]2won^J& VdcuW>7y{=.&!T_}ဃa6 dׅFMD7-P9Q+J,m͔ő߀)!'ۄ %k6F{Xx<@09ez  ѓZjҐomÊO k?DeE8gB PćgMNo`p `[R`U:RBc@B o;PuZ5 _B3C~䱉\|3A&^ۙsCKʻw0JgQ_ a6şuim;b9=5}?N+O8SٸE@nV墄 ფÜ!8K!ᢚ͕/;.zG.K+Ɉ?'MƗJn"p_*iDzRf9|fnrQ衴 ,ܞ$F H*LvU,h&vByڊ|!QdO>ncq)Αy\o%l]* uג$lT4-sOMzϧ-R1*l%YBrf*^g!ß)6^6&=|Qr"6^'+ skwº ?s (_oqԖļ8e4x*q䧲#Oh9fl+|&YqC*S|,g_^PQ߳9ŃWC jGW A>)Fc4c~Em÷V/l \)A" t灑a)̄U.z?9D l';뻵ơS}h5W N%@dV#/u?5S^m/m%^x;,oc&'-FFKa`![aшZHjP[%y*&˜U1Г۹\]̚-\/qIQFX%02Lr9Gʳyf ^,rG (W3K]jׂ%bAY_Ͷol-XhVYKx2t{tH6y%Vǣ0e .7sw~i IwPFbPɵ̎ 1 t\\MGus`;"<sR| \x"A" xvN '4֎(9< ̋;s%Nw??lXm TasN+.09:VH2sE]4|ܸ0va>[E5tܼo\Ck ^m}DQt`6q3G*k,9

;x >@]8Xq㣮c`)T~CQG"?qor2VFvO +s6a ]hrߔiׯ6i8!<_ۜ(ϣ3aǷ@z f7oP'*NH{>Y8N &]-H C[ ;ÚOPVǺVsԡM@ϋ`"'ϮL 'j+L*U_'{#PiOWȢV `z4͌F0q(m4f-r3OY)Zu%ɶY(v\0Ջg!!C4 '"WzwG>b>-4-j6*:AeHEߌ;yRrR?) c C͏?a džG^웊[Xqx8wd<$J 0t=w 0Ǥ#`# _w~F&Ȁ;tD9&oh0Oc7O?z!usx;fݪhȝ fhߘٽ*L/ wƇ8F%H1* *I*Ss3I"F'Gxi>(O2p5XT~&͓]z7-XP.1 c k ԪVI:`.)_w/~~~ݝ0n"_4܎^]3w??ۍ_1U{Eؐ!#?O8I64g)K+.ģcVn5 *>I_29QvLډ_Gq}H1/K%bj#.R#q->hُ^G0ыqtĸwgy/}UzE;Y ZpέKL i$m$46X6:BD8)ݓxak+kmF GI{Lz\NkwL֯eL[5 V0Ѯ[= Wֶ$CJķv.i?_lk6MD%X@ }ax=v3!;QCή T#$c*Wr'JaW`g`%H63xL=㩬'(TSlR73ւXDe0fKJ[2.X,K@ T ԭl7: dǛ=+v.ʹhA+GS58*B$1\ɵ"^ˈ$៞pSPQ0/'v>ժ^K_uj}EC$?:h6*s/,;@LP@p>rMhmA䢐,@? YZ