selinux-policy-sandbox-3.14.2-81.oe1 >  A dBW^^fC0G~6O΢yqZ˂(4b FZבovC-[GObQXp$jh<a9ЫmԷtuڄ$`1C;쿐 ;XWN\JUF찼c'dwt2 3GPh ~SXx^(dU-t3l.2m$>5b|GK[q1=-_øeՐw}LYm |JY6cef433f00ea0274d6ce6ada4c361a3d1d8aee8722e9d0e0568e2e976a4b6305d4b17ba71099c3a519fdd289491325889b12847d:tdBW^^fZqV"Ҩ-YAb H<{uYk JIPշ\/j")p1J>FT8f~eHpqe?4~G rP^S.Wgs7iWtZƫ0yDhF]Jվݕ77ҿqpGgse>,q `33GAW}A֤=h#t<3aMҠn}d4X Qtu}6DpArۦ R>p@?d  ' > QW^t     Y \`ejk(89:>"?*F2GhHlIpXtYx\]^bcd&e+f.l0tLuPvTzUhlrCselinux-policy-sandbox3.14.281.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagedڷobs-worker-backend-test-x86-0007.novalocalQopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qdb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-81.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-81.oe13.14.2-81.oe14.15.1c@cc@baa;@`]`9@` @`@``,`_@`P`L@`B@`>(lixiao - 3.14.2-81lixiao - 3.14.2-80lixiao - 3.14.2-79luhuaxin - 3.14.2-78gaoyusong - 3.14.2-77lujie <572084868@qq.com> - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69openEuler Buildteam - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65- add rule for hostnamed to rpmscript dbus chat- add the dependency between packages- add weak dep of selinux-policy-targeted- allow httpd create files in /etc/httpd- fix CVE-2020-24612- enforcing selinux on sp1- disable selinux on sp1- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- add add-firewalld-fc.patch- fix rpm macros- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status- add avc for allowing dovecot bind to smtp ports/bin/sh/bin/shobs-worker-backend-test-x86-0007.novalocal 16903605033.14.2-81.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/2d4431b6548444c1f38cacdbf089fd3e-selinux-policycpioxz2noarch-openEuler-linux-gnu.`L^dXY@Outf-8e475886e35727ce2a428ea3dcab6504b9a9f26b5e465fc814aa7f317bc179bac?7zXZ !#,R A] b2u Q{LVKS1Rb%#-qGl}X==40~6ֺ3,!jL)]_O%~9b> ~"'ݬ`NAM${Pf|x"{! _V&WX\P|d{:##B4f"<6aܘ3rM1mkzYGw+:ڞFsM2|.="5\YPf*L-gsqV( ; pI ρn|_- x.͔&ju,Cr0d^`'>top[ NtʜcTY8sz'+;K(ږD͓ /RmX*ʨuvRYMI9L)} fC[jfIr᪷ /x1HL#:&g9'7plξ}NRG)+VcD |?Hj@XP~(:~E:3rGQʄ*t'eRJUS6}\m8\ '𣵗Jr(y6tcDƩ\JT=nPd?ƽb{/k]{%Qu/BeJݓ%QLAr%󚺥MLedZ<@dQ`د7q'(&ۆя mp9XO~RQvcwSLMԌvlmT07r\Sl'鼓\¥´q֠C:QZTX|:LC[E& cQsطw*"užΌv qfRbxcŽ3Ň蠽jRۍ<55 NrYllG"{̔i[GbH뀱/mr1, BKv´ Vu`Z*Hʲ;NMgZoGHiKWU?ؒ" :+7G@ƌ޿t"!""8wߐ'8Ś Hs2Ŭv|cN>a3̷`l8Pc䎵n걍T^AFQS;怤(]L)=<0m&(.a^ 8|-EYo%ORhֿ0yyɡvdD3FNϔ4 !KG]zx Ĩ0h96b[ _ 0r`Zx=WKӃgG99ȫ"- <>_B3tfCD@RyQ4$K@D^$=t߯@{{ Ptn+ G"O#]Gåq?'妪xS\%t 8:ƽ,*HrJ>b.@>3IҞ,/M6p^JMR49WMП]<6D^+LxRY[W||!s8.𸻳4h *"K$>>Yd5p5y6PU-nv~4pFZ5Y)J\\}7yB7};@hO˰ڵ47TW:q@YOV:>46z4%4.? xȲ1ntmQ kb>ރYs-Y%j)aIm৶ʊh5 (t:Qa9zݕ'r0>Չ)SlNnC.8 5(=6.%d9(aӜŖeBfR:ԕ SeSO(٩%A=)d!i%&6%f2 l UD~t!$#xa6spZ;c7'tTy;+ R\F4L|)2ޖxa,s,[H]ԯ5T5K, w5z(аahX5Wlb[F kep;hF+Gxay0J ~?;UAxd*քht#5(׀s!> ڡ%lypEeѵe"Ca/]Q;gl\޵Qpҋ-8s|"9^,hBKƈVgBv+%!b[硤ܮфLTqpѶd%rʛbhO*WG, -͙A))whG#'g4-dғ;^z*7#DJ`&ӯ.>Ս6]Dƿvw 4'ߺ1GDYU9!U%ӵK| 8dS_y1c/Fz]}LhX8f7GBz1릓 qcos?Zi=| \2:U\.w56OGVȯyh#NNRR9Fqζ6ρ(_Uޮ%7d-_'g|l@R:Ygy #MmFƏ4C,aT$~Y󺧺tRg1Y_G/S|څRssb(pF( K528F?AW6<[-EJ!q{fES4q^jO2 ;1oسM<7-ws>AVUzТ[KT2*AGR &G !p?,0n42cKA.B%^_G\.X8ik#&J!ۢ]^ή'JZmjֆ!Gs/onX0,4#WF0vj2w_޽EcPƩW_\(W;b]L nϒ؈TĚ]j-ո 'HAPA1]ފX{Λ ֿk",4M>^}xkiMKZ1g_&܀%}hm5Pzk}wSF30#Rq癿-~Dy+Mv: ݘm~Zn.!Dei&qn۶_s;K씱sӊsh.5a ,@5}~O3,KܡH\9!j;? &nF5Zy|{cp+cS]2r}z'I>a9l r.oo eXNu_)4ljR!^pڂܲ pƹ~5cӆ 2'Ib)ۃ:<@{b1BϻB5h of⟭:l1E>seyU7yUlUB\#H82Ms SuE\*1bQB)WoO/ͤ/L]s'<zJ,uCt5 kp2֤HU 4qDN0<R58¥XmPU9\PaB 뾒kŅ[rsA[Zm7ہZj"Qam hHX:D&"N G͕[=f= x@|L#ґvLMfGbfRk $:'ȯLER'2f*:Mj$sX˷_!4x+>ܰ )B|ʨ?koH4nIZ)֭c]߲f]{03[>eO-SB\r_1  $4gTW?GUG%x+%Fq%t2w:r}{W*kjJ$Xs76)Jۡt)0|V7H^]fe赶O@b8[O)&ZTɂq\P{ZgTh3Xܨܵ[IvEThD3h~UH,]zoTzѱ0>z2`'`@>+#Ctm]TY{uʙK75ȼNٴ"zVMأD\)wdڶ d+%M|&0b:[ޚVÅX_@/#u-\?a8义coDor3ay3V8gVG?(Ȇݟ>V='A~Xh+ ܃y,MY./$NqlR@VOpn @}#I]?MhULBW --nw^ ,;U-_@Ȕk}`͌ MF"Z-xk!9kD[^ l(KnPu2B/yGFhȥ(q:_{VVv-M* )u &jSbLvu; -VVV7;֦bsf3g*jæ;Dq]O2QZtEiaƢf}(JhZn6Vӱg i&M 2D";m= R7(O۔ C*U4hޣGdF~JBI3*&4򧙑r`%֢78`rjЯlfݩ^?!ᥕdzIh&kxz YJBp`N#he& 2~{,LqZп6K|8q#v&{nU&!8dV@ߞ/,5(`8j["BݝI<7u반B, " ~ASx:ƳbCar@,F$sB3س< m*E(s/E$H6~~D6TFu8d~9{=g|S*9 x,Y0׭H!ľ\@n4_Y2/K; I}U%i#]A$oGz݅i. xt5@^ YZ