selinux-policy-sandbox-3.14.2-76.oe1 >  A aa>W^^f/t7 d?/Cs@>.2`ȥ=]Yl8yB8~,&2tC 8Y;PV:3%"ߎm_z #3t\[o̴-Moy[ 2 Z݊jC9M\_{Fv@L Knɧ{Ev+) gׁ573277843a028e1e83b321ebb2443f7ff0830fb0cfd65fad6901baed505d5e1971c5958904ce2a6adad0769669b9cc7bc13cd1acAaa>W^^fihw[gMe"0DjAihHH_<2h]_5:jLsRz@GLin:EeFq)D;O=\PMJ UX919f/,}5O ?ֽU)CKs'H4@(,S{Z7 xaiLy&4Rp]6O'ֳL 7abp5"\M+R>p@l?\d  ' > 9?F\    A DHMRx|S(8 9 : n >?FGHI X$Y(\8]<^Gbdcddefltuvz XCselinux-policy-sandbox3.14.276.oe1SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagea`iecs-obsworker-0011QopenEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Qa`yb73d1b8033fcf3797b09fb36328ba937aa8851a6d27361781a246813d3021113rootrootselinux-policy-3.14.2-76.oe1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-13.14.2-76.oe13.14.2-76.oe14.15.1a`9@` @`@``,```O@`O@`B@_1@_@_j_ǁ_0@__:_O@_L@_;_@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@gaoyusong - 3.14.2-76luhuaxin <1539327763@qq.com> - 3.14.2-75luhuaxin <1539327763@qq.com> - 3.14.2-74luhuaxin <1539327763@qq.com> - 3.14.2-73luhuaxin <1539327763@qq.com> - 3.14.2-72luhuaxin <1539327763@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66openEuler Buildteam - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63openEuler Buildteam - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57luhuaxin - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45- Fix CVE-2020-24612- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- dont remove .autorelabel after install- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- close selinux on sp2- bump release for sp2- bump release for sp2- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add add-firewalld-fc.patch- add avc for openEuler- add allow systemd timedated to unlink etc file- remove .autorelabel file after install- remove autorelabel creating action - rebuild with policycoreutils-3.1-5- move autorelabel creating to postun- create autorelabel file after install- fix spec changelog- update selinux- add patch add-avc-for-pam.patch- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz/bin/sh/bin/shecs-obsworker-0011 16409805853.14.2-76.oe1sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/db5c650895b3b593c21d17a5bfc49db9-selinux-policycpioxz2noarch-openEuler-linux-gnu\PW!'s52Eutf-869a4e9afffbc5b20a519580cafab2d05f9dbe9e784b8d11821493d5904affa0b?7zXZ !#,R @] b2u Q{LRbSTQp[8dxC$53LM)9Z+2]EoG^w~V4?kL{1k=mԻ<>L3~K+OHW g+6CggBl2s|nvx¶޽6`vgMf~0*d2}ԮSRޣgC'/8 *M*r=ya#osJT0 mLVdNcmrf8ultT @ PCuip"q !woUl=v6>F@k|y N#Hi,g]8-:x3NmK\5ӦYnPXy{0+D~ݖKWsoWfɡL,,{fjsxku;M[@dY -p`"r} IA)Fd.VL,sNP=M:e @r!< 9pA熤,j>N74.,AFJ˵ZaH/QؠѪˊ7l6(ě'7+H;U,j%{#ۧ̈N" OuF28"t-EecGB G+~akV0oWNy/ :G\) .-lK*aˣP4y3'r"3D:`%xuE,y~e5f6P?`l)yVY(T7kLgDXorz p{0)"AnH|+T=R]Ľmóg5n~mBjU2ɹ괚Wرtd]I:uP *DZz,T졶&9eˆ<}:yovYu~Z` /l3Zz9ȔܶN֙:; ^71;X5_mzgVMsqa1#ǽ#;ҤBՄ-Gh+HO>v(µ+f/Ƣl]ձ_wVSRAL GU_"9%x&>ɍD ប;0@Xx3>R3 $ Tm/x֖m0W7*~,3=5ލL,P+(uVOMyyP&ipB(qk~%(k;uІVaˡiW v;$c_đ%(s@Z8ǩh}qӑ][eYq0,Ġ GaoBvP0̬=.0?Ĝn'u^$UO#G,cm2Ş-nAz+7v $sKR%xcjRpL@d:'{Unk8!*)ײ=6b=L"Jd ҅v恶{IDMZ.67:xgD?p(/DM d]9PB(d^ 0}xPfRg/}=:uN_u#YcH5nM`͖8@êlr)? G15mkEd(m}]q3*dy F=¦{IEzސ#(`DL8sxwb<>@8NW!vmNT[ }TxT}MBZ=BRn/bnvC޵p=PcAĸF4jm8lہ*E~! :aSNTO7@Wk~w#$=<:̞ٮ tǭPz@.Y(dBHZ~k/ XM@ZQM$|&^f+&xcӣ8e!a.P Vh,4RI,p nWl]yˁ\*xbq.PwMבUӖ~z1ߺs0KF}捧':Kn} 8TC]$8aJLDKv:(5fto1,wYkX֓CacҺ+JGP}ѽ7ɮ ZSAԙk aW>c. e+%Ny| SӖkum7x ](fܭ+ohFz :m̦i:Wu'i0|.E*zf/?鉴sV ~>/Jpp M%)8xicj4k_>79;8w`hw^9$E;/Iɡ^|>翨3F}&w[h V3"݇E @$V&" m2Mklk$}vv#U)`D=;uSN phBak,> p&$(`3%?GA?.G6.R \UUua x T\kTB4WB𥋮!8+,nIՎS~)o( QPJg)d&,^wy <\#;fpZgkؾ?A.AE`iR@5| hw+ J?;9npH ٸ<49 Vgg{Ҕ a-fL_wWb0䏿9Y˾~ O_/f_%kAhr`o+5sgY^&]"y߻8me޲@xi|Ց-b-6V 8;Tǃ-^kznf˜BѴƵbFtTK~RblsHT&[ |Y(xhIݪ vW Y"(Kr]ڤ*io1P!F3sGSYayh́W=+.??iAS`Q!wZ?^ iɪQǬh/C@DҼ~6';>9̗Z!5?:p=ޞ G%!4viPmdU* T'^[wa3lewD@F1]~tDh5}E9//g03 /Ҟk"Ҿ55:1֤vBţl8E@͗UhgR:c]! w*fFÅa >N!٣5"jteѐ2qCEI9\ |KC` LjX{oDt68B +_͓| / Q",[!lũjVez~ | m6^q4DJՖ`xZL#"'&]?۝G8K53k$U#Bړ ׮w= K0P(s@EW'㥤q.D,cpl ){ E+]{G~D@pXRo[yKؕ}yA#x/2-C)67ٮ%(T9ǜBnhLwuhv\v)[v`[$n:U*/ enX\,'vb'C8p39YM1*ƥONOK߈U^Is%a{@ Uج@"?I)vB6+ָѓ66﮳~?feF%4--d1wJC7"ٖP\|r!xݗYR;e >Nl=] Yi>D/ڇbi.TY00]O xbNGHMIKT|99e̟ɐyW(\.MVȯƈ?.ʖD|2sЋ黻ezfwPf#b,k<ߵ)Q%Z+RN-%Nxl4 LV'ƍ:`:[Z+(?T!'L/䫼i,؝DH9q+wK7q % HCXKp6Ser {߷ҹ&{Ue } &b+1Uԕixߑ%2J8;{~urC܉g6/ȨLJ;uG" J{`IagPv^X]Q! d[y- ԮTkjdr8A y8xqWt3&./x7Yx>30:8=TwS~V_"d<kއTY !jt@O^eթx1|e=IN0j}clh'B0$@H/71Qh=ڶ78!GD{ h}f҂lgjFo "ɗ# #Ui5 v׼C1!܎"cC]{"P*+:~jIeWfRF~L ¨:wb|XiJI";#r87NZfvƎVF0w#2ܝkV]쾪CjܯB~iz^L}A ;9ۘd:#4'0!dUXtWv\Z"+H=+?Ze3v}١~ѐ[ 8ta䓾hiV{6JK/8eQL$jl(0͇Rm^n]Vbc. лSszAW+ϔF|q-laaJ9^d:K!*@h"J;D_YoiC=7T>:K(,PpG`Fi0AzIm2[ܪ EEG@? YZ