selinux-policy-sandbox-3.14.2-75.oe1 >  A `kW^^f700H6WT)S^ƒb,nH4=bA!p#G|rb% 5pߎT(zl9^:AgUV`bACӮcL-9`NChs/k5>h}WM7^C^VN3bc7ad58a51ee2e97bebec07285d2fcfdb0960b12a32c531bb48d7d94a29a2eb51cb7870a0641b977a0264f8b937e382cb90dd430B`kW^^f5 N +Uswj 2SA !j =$qڰ3Y||J'TvMD)bYWw ϳ VWzxhZᄁ=gB ,JUW `myOpn^Рȹe>%6@;k;nNfG+'6z nwK6q/⠿To5s_Qg;$)6Y$4U-wUPϸALQ|O9-~ǭR>p@ ?d  ' > 9?F\    A DHMRx|S(8#9 #: 4#>?FGHIXY\]^bcdjeofrlttuvzCselinux-policy-sandbox3.14.275.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox package`jecs-obsworker-204QopenEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Q`jb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-75.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-75.oe13.14.2-75.oe14.15.1`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]q]z3@luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42openEuler Buildteam - 3.14.2-41- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain- Package init/bin/sh/bin/shecs-obsworker-204 16244681243.14.2-75.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/1db2dbc9da1e524556edec4ec96fbcdd-selinux-policycpioxz2noarch-openEuler-linux-gnu-"8)gutf-8f75229e2b1c81850da24f22533be0db61b861ed20a64c8a3f94f5ee0d44eba6d?7zXZ !#,R A] b2u Q{LQ|vϟA#)fí{úx d( XQta9\bjmL9حv <9Jd TxZf-F * S4).He[!m%|n[) 3^{4bhXqZ/d_2S~m%~RUdv y%k ԩz)Ȯx7M lTq>SާRօ]97(pΏv{k)gNVD}s֟ ,^E97PiU_ b1[Fe)b#.J~oMɹ-wjfCT)[ŏvXWջe~砨ajcVtk$2JˊU00ZUjp)+zJlڈ# upI_X$.ǦZ`w ۑ/C@_H`ѣ f2V)=n,jw%E5[Gu5:osel,$vL $Xίۇlp=9+ θ*M!m%@O_OsK W]ywm B5?qwۆ;__s8CC*jLYa*Z^HPNQV1xOc##jnVË˕E@z\^W;Po'㝫z0 eEhR $>d /[qNw-9,SYno@UmӃ o]t$ةD"(3nP Eƥ9BN_u>]{WVK_ $tсo 1aS5"A?l+5P覃xC5" 8Ȗ2E(!SLMK_7 1-[ZZr-3}dD[YIK#- (8tq>\9~rB~@`Q|YQkf54F1!?^]c+S\׺Akfi Dl=v1ҭiyg>:8+ (4<ݳ SۆI_Q,h`4;1'Tf~^8aY0O4]~䲾{:Vy^z rB7t`gb ?c@05'H8'=&wآCn`-chK^!ȏh??pxar󛚟Z@'=ďZOgO2poX:  $=1AUYbױtuB*a<~4]Az2U>- .oc"+LqbyOxo}$XiRg@ݱ840Z ioЫr ^+Ŵ-֪o@ *G,P<=2P2GHlVKSꆚc\Nil&R2~jo%{"h CSEWEX px+iy uEò/WwgQP,˟ϲGh>e}ML.a5qu%lUĺ'LBOqv{>Ǥu `I'l6gӎJV(/NYT) ɄhRHKHBl6{V''{m9Z#NT*@hF-+ޞŸĨ-J7@(]RO!u2m5݋Y3 {ƜLc _9R]x/ sUoq M.Ky5DOP_+g[-NjxyZ@(Yag)ycn-cD9E@mӵޙ>U߷|sn5O qZe=P gLTS^*CT E^c%:i[z: !&dX\ЈD$/!s?ټ>WF 8#KN,>KIyXc ==6wako?(ɶ |%,rnL<^SNn:MőHrAozܓ~zӻwJ0|^ ƭ&A8Uq1qF9EzkBm:^F F􎰪W *\vr8)硥6ai$nzkWvCƜoۘChwTRt@u -/Zp7*ݾs?kxPOG G5:b4.^PFm[)=}vvd/;P̺PZ_i>uŝBO_}5pp#5-ïDfd̒Q`8t1afaCS,IJ,Olf7E[ oMQI+bکdR{9m$<R_>d_J/C_1BR|,AYeH@H١niLDOCK}4@IYy& h aDX8 l U:hD $اtCe;K?RPhk֞"]!s=SuT٦HAR\ƻ1'#Z5KJjԥzq <^̸yFs#$"Fld$|V/`H&쀲u@ M [N" BM(8غqd5 <ݽ r 9~Bw1aDg_ Kt͛RX?L *Z I3Pz@-^yLf2 (:Y]I{!'FB 8 Y 16%3lÖj̚L_s0Ɨ @<$[h4!_)%z3P(bG\DJ/=*hT VrdtG7N ;o_DSPO8M&jweyr='z0 cI(gT/enH֧q: -[JՔ2/4 ڔ Q;3M4{faxJn`ЎWU4>-ֈX;*D}E^~RG&IPJ][8,ʩ/zBŞKl%*MtwWra~*X}&v(gpWP.X [`chp4$z/ciK*!X.TRFR`?Oi$%3D sh ɀ % PUg-ئn2GtFC٤V/ZcS-xI9&͇ a<9;]͑%B(A &9ЂywfȞh틒U, =*ZEΫ|O(PL8k]+>.lUF'q;T8zq_\B@W o0[+~74#E2Vۄ{QTVV^*͔lc e;K|y[%L!T+ 46дa ׼ށPʁ(I;d)j-o%P`4gn z툉%Pr0֫DD)#zh^qc3?MMV~4 %wGڐ!l8t(.ؙ wPWPs]h3b?ly/ۯ$=1qCnBy,|lCdDB1e+  A{LθpgQ9?[1@\u"mHSuՓNMvX zXc~]I>89)2uSsbb䠬 /|(+E_CggNprvW^h"?fU͔ r|Rl[po0PGh$uKݴB di:j(CWnU'40( !KSl2,p|7Hj^l{}'5Dru.z/~KaE |1ޛMمXc]%HړcrTEry-.pioro ~rqѫI-cN4W?N&- f4ĵmh~Ř;"*,R}ssGw> ;c+r^i8a mv#82xȞT3 5HWm'G<_,7-CۖHװm$ [ӾC!TB ֫;YǕi5SeQA0ie-FΝm/NaTr"پԂhՒ"ӟJ"T(^V{4$P{wq EԾ8*Ugړ1bc'ϝ$ 1Am͊vsHȴrxn*?ej ፏ* 倧d qs٣o jj2 +:.7ҚxsuC˜▧!uUrH#{1UpLF(>"DsLJ6bԢih ¸$l}bNOT"fypۜ!Hg~S['0On uĒ=e7QAZ7eC)IN\z1Ibs'{u)f4G>&4, +FtGZν2:.}d|~5亃=הR3𝞷S )|KG [*bC.2԰$@1Ǜ JC9p_.g{xK/? $:fj7Bsԭy|p]Fq6CӬ3UA5y Ym&ur7,֪M5 s1>2mP!:TV=S% k羼n²WW3?Aj ~mĤ;x @Qty F[VS4=/@T.pڧ/ ><;A{W)"Ǎ@ZXAY -CRͯSNJ?-/\M矜7AHRIy?N/ cu(oGޤwAׇ} x1Ym ^g7S3RIJ\OV>IE>,VBH#ؑQ86 N|8!*_}dUwu?q1%xQHEGy7!(Is{gLTCDpmP"yf:PϘS +3RO3Rڊ( t|Wc*ok_JyMۑ+XձA$6d1ɐ\4lʪ5U\zb'+mh SM%pm2K>m*lK95l*־b̧lA>^87ޢ=ňv6<-**y{^27J^=^K{nPEas2FǬS Y'oM6m/Oˤ^t!| %8 ;@I6,F%[Ҧ5xI@s&BJ`J <&tz Q=Z|׈O {ϑR™}GK'L_-4SXdb)7#R_( BX ^He2 $98_a܊A-!Wd} 4֛u >1DkP^[H<MIsiQ h<3o: VE7~ ‚l`iE3o筕VKX?_G)QU-t54G/Plq)m$su] g<\-A# 0@fEɯo\Ҵ,׼LJAۺa6iWmsbt㾪&YL2u-gOx6gHh精rF2O9ٜH"ϰK9Rh^tJgj3;ʃfU/SΉ\{PuU>ba-d?aX83Ӷ?6#U81P܍vĢ릦2bb>Ѡ@rNeEZn'}.2 n+eA%