selinux-policy-sandbox-3.14.2-76.oe1 >  A bW^^f]Vwv>gec Jh/b.[Y(CRj~334b9*T)Cԯ!?(PY(}ŇB]i Twl7uot54@w!H*cC5yP ӭBz$["mj3KƓT9%X{E 1~M~msAWH|NqYHMz7e4bcc213ed212d815e84887ae27d56ece8af3259b9229d0df540b012f60512b4cbf30e4b93484274c852d20e7f90652de01f579A<bW^^f&p{\K^3[Rǒo0b42䗄0IQ=ȆD %!t}U$?(IBu, pJX{FtZ9ٱpTn Ϯɿ(dI0w#Vde0ej'L6Cw Tᮉ ZuωQTz`WȔb|W Յi`YM+b3"ASsLxI:k6TEd[at uFR>p@?d  ' > 6<CY    = @DINtxO(8 9 : j >*?2F:GTHXI\X`Yd\t]x^bcdefltuv z!48>Cselinux-policy-sandbox3.14.276.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagebmobs-worker-005QopenEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qbb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-76.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-76.oe13.14.2-76.oe14.15.1a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/shobs-worker-005 16451234373.14.2-76.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/52be97fdb5ba8e5fd5b01b26b46dc77d-selinux-policycpioxz2noarch-openEuler-linux-gnuԅ+^GN utf-885fa969834d26218c587a7941039990fb9755adb7ed6ad20e19c3577485e18e6?7zXZ !#,R @] b2u Q{LT(-ɗYD^~Sڜy$ GᕱE,9z\h珊MG\d%^ree6$YS)B 0kUlk=(Y{ ǽ{jra͸HGiw=yWyu|}8a{&I=sVM>ge ؇{j V4g ʜoLU#ёq8"!Jn6S LDNB#?31L#Qhs=]TBe_}O z+{~4H![aބ3Egܨni˛=ԭ~΃ 2;$s"Am'ְGzk+)8}t&Mcԧ/RlD l8$ ʊ$3Tǩ&KNpN%k5wKD#伃p#p(ieXI*e&tˣG0!KL_QbW.vR]vIif זQIgú_1RUlvH*\`ȩ ;k:scAUNRƏ̀u]R] 2OlZ2:IwM 4WaB-Bк'#xZq˭p=6@MAK&­"wrgRJ%<ζH"V@04|FZVϩ"52::>ȼ+9I27f2mCj%,O2' fD(i?>0тݶe|JsNgϱASTΨ!B*IȈļkR^r?EoũPK:!Ǎ. ء+,[kmV~h$ݪA溿7XО3Q>ߙ7Qݥ n07;CIJbm^v0NOZa~O0eH_G)~j6er@tg˖n$EلPT`hV|w_?TA2jkW^xv#&\Ť-`r (Gv5cL:>%`_Ep q o DlKPE ?sOkth1즔[~E]N(|ݔǷmxĩ2C, h_yc6cHFAfH:@7Z-b~+ҴftSxL= M:\:&\PQq:qjEYZM?&XA3O;NV*YTģj`T&Yp"1V\si߇'==.^ KuIz?"6gͭ$( .W#H *Bch+k1|`@E(o䍅 Wid9X`;ѣAHBeVo A1YKeJ_P0kcw1n;\ GXj7ƸQ6iǷN yo1>^Ӗ25ىv;qIl|ƒ6J'ZdKkRˇ'%6{_73[:b#һvu)ejw5O;)yX֡N"e I!=,4} J;VL#xOt;4=[V|\mo89]HNDXhퟍb6t#ҭ8%{xP&12:xiMv&vsUέ n#c@&h+GrAǒac#d(as)TR ᪅nK*.7Hr;3|鑦RPq/KEQnįp@ADf'{umkTa@W<ۨZz[tӪR4Y5z]6dh^3= tUXHHLh|[&Z!_הk]fc_妋\ϣ<L7-;Zr{P+Ǽ |53 MeB=[+PT@ˮRq*a+0,Ѡ0T#e>g""-D'i-ΉwX}ꄛҁ>ؾ$9MNSӽX\n/!PO-&'s;`!TiD%~8dP*5¦ށ{۵gbyU\%%=3K5õ~O$p KxPzhvoI&y`9T$J[KWYHp, 5P:tEy*Ó/9SpuhO\Mq?9sQc`[8Mei=iم7@dfi䣁Spd8ߵNV4܂틾fZ_!g&#xτ/;ž dh1ץ+BfkƼ!Z=PdPtwɴ>-! 8S 6LWԑ*Y *;ϐh"B GB\?RmWwalw&@LzG gmIIth^3`Q[ O y;m^O+WiX/K18OqRwU- f5oXB7Op V0  =קx-O#T:b!?~~#KlC4tlU3Ge/djfބp3!J2x r, c"ݱ, ڜL#>QK3JS/pW5݇/(V/n0{1e 6UR[( K"?E{7f"uLQOӯmJݶ eڲZijVLnQ(eqR0eĒw%[ɡ5y9B3lu/f1&&L"9OY SY{KƢU)I+ sr篼'7^())3 wpކtH;ƋTν}w|3zzMw݂}%C{Iƿ"cl1"w%-O/*1.\ Qv:;=EzX`H6gpSd*%ǁkmK8B'jb5`hI!h0 iz܇q+r)uI4X]ioNPɆ1ZeJ, /`Wߴz^,W7%!lR "w&0b2T%ݤ&f+(+uW),gGCQG 63?7ps?4G厾=knk߯(,ȹǧAXa I+Mh}f0vO-T{]]_-*<ɆÈ"kԡCElϜ [j vX:4Էl+ cA}ɚ [ q$ً6#yq`-NļGwAĭ [>V3-_'iU~I^v?!r-v+utfT(s%Eo?6HC Y-Wڅ;:KBk'R>ԉR!,10ؙ=+$`rC};tyh뎐O0J%!k T5I(MOiW=||5F+Vh.,9X<"Ybe])"s(ϒ,pQYxۓ`CcZ1X{e^ܻsJ_,!Ő atFkyFdD6;M7nTćzӧ]7GfD)U.S=Ë0".q:F(O6swd$dz6>|z@g7͏gY|n,)d\q!ͲWN jZ )՘P5԰|%ğ cAE|eE5@w>2$drt%Ur|1pʶyb@ҭs7EAH "oa( ^/ ;dPaQ<7(B |h. e qǁ#BG \Hͱ)J !T ҏ$94 gܳ) <~TҦQf:#ev8V^ AF`%j+YǣFXڔzyRU/Hv:$oJi<5.lrF?_5^ =v!zkf tIª~ /F/J gE^B6ĐHL!ҵc9jD-E"݊nY[,7ӥ)P^_Ru+!?>9Dߣ`G({J^V<k=[H2yYzZVh(_GS j܎K0S8(~Up^zj\ |gB-!pCyzѴ7•$)cJzA\_= )kns 7-SN]"AfbQL ->\zptK8 ӖZ{GG8ƝtT738A'Fv8u'^#;>;щ@@v.#U ظI-:dgT ]}ܬr5*m|578PŤ#HEV- %8&2+xc43fI7*xii5]L3óegQ NHM{b0wD*LyVǾqbd? {Q0yr׍tle _ؽ YGudvB˓`іJV۵BĎj&գ*B6'>C݊X(usbq 7g>HэW0O"& O&*qyf~w~˪?LCrDϟYT@ D.,0~N'! p4kiiWYwY=>2)dN*̋%.y$XBBlOXz n6599T&u)SކRQ`s _5_a#]ottR8Dk;1*R&L;g^54ɑlb b]ܪLb% X'ߌi^"71zo\oyO._uZhO2[ v!Grnnk |{DP,Ab[⊶ a8w7.H=rP^llsxwK=YC"9Wk)Ҕ^hhYԏb ww814;`՗k4Jmds(@pxEMndt)L/ b8թ1 5O찱#=(`]]pP(BK5v!]~Ҫ,I`&49Vg#y !}m%dwzt8k{P:m ljCx LuÎT5W8}aTGƂ(3NK=t,l}9)-cRAat7I =YԏQ "x *'htLJ;7B~;Jq.iScmu(yc;VfS Ib-%=pSFf> )JZbHBkxEqZS0Tjj#u7\x֔k,aΆ"4f BBa#dsӎxm)1aݰ%ȿ[7hy}՝ TKd3ih@DxH֋$\\znCfbÒک*NU8)-^slh`HcS$ZȾw  UDldN 2cÓF|C?#Y4 ofH Ȃ0NGHx>pvWB$00 > w|)IHo*._IL@? YZ