selinux-policy-sandbox-3.14.2-76.oe1 >  A bp@?d  ' > EKRh     M PTY^_(8 9 : z >:?BFJGtHxI|XY\]^bcd&e+f.l0tLuPvTzUhlrCselinux-policy-sandbox3.14.276.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packageb;obs-worker1639015616-x86-0004QopenEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qb;b73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-76.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-76.oe13.14.2-76.oe14.15.1a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/shobs-worker1639015616-x86-0004 16450999693.14.2-76.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/52be97fdb5ba8e5fd5b01b26b46dc77d-selinux-policycpioxz2noarch-openEuler-linux-gnu/Rǜ3 utf-816906b2189887feeeb085fcac6e2b7d665ceb173b58ecb58ce9092d1e591f08b?7zXZ !#,R @] b2u Q{LT(iC^H0ܾ؅cj+/KS2Oe 8T"#_mҎO3H{_;w7Q2KБvB[#G\N QRIhJ} W^a9×NB0ɐP6=K KLIq[Dܐ"-sWw"tnG-(/?:get[y,z;/iƊTZ!gzGˊR?hm)hR뵵F0g؊ڞAζhf"寋C~YQ"bY ] TI䆗 0:ͼcmYjɲC?2{ǫzW̕nLL4E%.%f>7t!|KaH1ϘH[6 {ΧķfNvg?h1lH|ʇ&Wa&9Dme57(5#G(zY7X_b%d@X{23⤟G7UA Jv: *͔b Ld @:-P\dbuy yR=m|&{2oMȞ'G"A,J\!Xi P)ӧ OR}c^XHl<~sFk٧DۀIel ??%PRɍsisPoyj+ -VNi/~孈>%P2ܝ$nM?F!Ƣp.W7TLJ]-SVD8śA 2KF,\(FsMWa\)]7a׀ ' Ҹ#/G䪜tV?F<9[//Zv V0iE޸ح,D ^B?Άe計{:|DQ*R 6Nw!9M/g7Ol~ltE $ ",<#NQp/By]! Q{F$~ܝ4_-p{#iɗszx++o4 P!a \] AcqC;'-!dHk-ln>0XSyg4 tGr[kyyH=gcxT ]m\lp# !Y#p@0Hi&EP-^^UP j~ %(TqwTeI *™;O~nkiDgf :|gTcԑ}{` 6 -fqƣ8 Hh]Vjb63#3Sg~B7<;!F+G vѱ;rTf.d3^Fb@ڰU=+/aOـKrO.SaL(+̪€pb@X/~Q|aړ^Jf) ۔z|2dwXF.vd7V0*3YgڪW7d^xFb#R!/ LܟfAA =ѱx=_$) esHg"ii3me?: %^OǶ$ )W & )7kzwbPq.*WO6}H Y`#_Ax3C!OYx4B|ZayP&$9!uo+o;a +'Psw2-봖Tꮟ"4#~,}:"+zmuHtj+vwe C( AxiXnPUUPH)̏5h#f$J(!1Wo [42B8vGqtX!@Ȝm7_R]K"kT=g#0NjI܁R*ٔlɣ/zV.3'3 ~tNxf,m5TWֻjEW\C'sNxmlQ1:9ԙ%Oؑa.cZL_ ^Լhݽw4T .NGk)a ѧб~L)a˝NJ:g-J&Ǥw*/3G9hdF?;S=g*z mpC-ڲcAA*_k*{X#եP'̸®ʈ_ ovQ}yC3h\Di]aig9A;x#}s8 hC=jc}Daq p>>G fS7 ;CԒS)n+:Nڔ!0$p 6Bp9}@! 8ڲ!$n+c|ZJ#:gRXVzo _}Δ\S Vy $o8QAҖS"*YX؅X/rQ_хkOޏ{}ۅ%Z1jvϣ+tS@C  ʣ)ҶB-/`{nعYyS #rPGyPN X8{x P U,}NED-∱]ӔȚt,z&S"³^CR)玞.@JK+Ky>WVU+i˵e>>ZFX}l gyGS4N*:a<Y|6Q U_Fbvp7&k*mPa/ɯ8JF/dcr~5RQCFBl!6e=#Q_B/i+;K˞FBSɅ"U(+AY]uٿ[qB eLV2muzdK~h7\WTpOv#aTo"툟v JߞVF &!²&15Y bчG^H&"]^sI fߵ1gL~ƸpN3ؚ ,p;-'^HXE(1 UU^ܥ|Z^cd:1`U՟GG>/jnx5lay5E!?1DٝLII^O>| K>J8)Z^Nf٨>ԏH*Un4;%y?TjL 3@ A@჉2ȎFb!\!jq5~y"|Rio|D_5Dݔ+AS} n3%IMp  r>y^| 2[͏"Rk0PNFFaS%!fZ`\7vQpqeidܼeC{ݯ=M_~v1ɎŎ AbP\غNWGxX\WxL0gVrri 壶cɵSͭz5E_B!8V(Ë(D1 rI[ҺEIhTQՖvj=tA&rT^r*ɫ>uNAIq"XS9C7 $a;bWk׮ƩOvjmgOE9U^ &1b? 30dyXHIzKYZGmz<\Ƚ`)v^aȭpْMe+RIB gD_V:^?&dkEX@AEճU= nXr7Αo/ړmf@,dPÎ[aX9K0j~=4רbQamPhLf*}zJ~;u@vY~օ(xdH >u'ڳ9_Ce yU*\%:'r 3 u!9$w`g5֖v[QOsjH SxYLo?+_tڞYd܅φmH$G9#Uք!gjIN a/_rLGWԹ8{Qfto:K:ؑ3dMat`lwĝX_Аdv K^'Wa $v-6 E|o]XԄɝZ]ߢvYUշM1A G\~_SMgksnD )}O E<9} oJ͍ZKWMJKkn$Rwtx-8b8XϛdE{a]'y O"Y[w't~"G(m5hוQa;+fޝ3WΟ=:m_ܗy$ >:x=4Yups@"U+~L&oKvwc=d67EJGA ʏwܗȪ_@ح)=;R'RMwɢ׏G022 T:s[HݟOnҲ NKq7b"DE꛼tF,KĆz00DWX|s:+-l 6wS/ p EߌCɀL aH< pavE 1{g+Q3ܷ]8@4xѭ3/Vco(|nH Q7#Ab{Es'67Tm%ntrT۪O Qa 2Y ,EC"Cɑ̥ϩ՝H}H3ek Co@+p~ԯS]?wLP3'o_3.?%˼yp)h3Cu*:Zm;;OL+/־(4U~]i`q[mME}vfr HJ&Pڲ&gٺ\=ude0"a d3^!, eM z,}w~ !++U˔/\1NG:!߅o1[V̾35'i^W+&R^0ּDxe~|8UTI\_`~_ßctǂgn \'HeJRCiw Ax1ZFce98`|m=[@8l͆B&u[)U>7c*d븕U509Jhuj!Lmgd& N+vҨg]U<*v "t bV0/>9{ 85'e;d=E+/J1C;[J t "GB D<:A-ni)oS ֠nEx٬u=:Oo@$ZiԻ=*zrvKq|Z=t 7S]xtlyn=. Arc(6 ?X34R{HjѷWOZ+>պ` LcsԸGGt  y=+TWoЀe⭐νl'YA_ R1*Ƥ9v#7m”VGW}lvJыXQvH%~CPq`*$v \Dh]1E/zs]l$K;&p!\9]bj 1LO<