selinux-policy-sandbox-35.5-21.oe2203sp3>  <@PT@7!.ܶujG7oeEopeneuler@compass-ci.com G7o 1٨xɗU <--_o>w|qrA؁v{&Lr%& "m$ !)agм7-bWū0&o_/歙Ŝ R3W6יYri9uO<z*\烑@SuXH&|.h;)+נ_ٔ63X s{06StDttiӀ-"SUG n0U%ǥ9ʪGIy<5+6A9< ټ TgGY__2 Pi`)H Ut>шZ/̡!b67cc0a2a27888f8b36933604bf373c804d354bb5abd44ea9366fab35bcb192a2701bfb024a1d1c954236e388efa74ee8cc039a44f$XE^9 ЛX>>Y?Id + B  !      @D\|(]8d9:> ? F G <H @I DX HY L\ `] d^ ob dwe|fltuvzCselinux-policy-sandbox35.521.oe2203sp3SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packageedc-64g.compass-ciWGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0We ab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-21.oe2203sp3.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-21.oe2203sp335.5-21.oe2203sp34.17.0dF@díddd?@c@ccQ@c(Yc#c pc pc pc@b)bbbjb@baa@aA@a7T@a*%@a&0wangqingsan - 35.5-21huangzq6 - 35.5-20zcfsite - 35.5-19jinlun - 35.5-18wangjiang - 35.5-17lixiao - 35.5-16lixiao - 35.5-15lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73- backport upstream patches- backport some selinux-policy upstream patches- backport upstream patches- allow init_t create fifo file in net_conf dir.- backport patch Allow virt_domain read device sysctls Allow icecast rename its log files- add rule for hostnamed to rpmscript dbus chat- add the dependency between packages- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux_requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page/bin/sh/bin/shdc-64g.compass-ci 170374654235.5-21.oe2203sp3sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2noarch-openEuler-linux-gnuW3ZAutf-8578a681032f9cc1ab248da3809032a42797ed0a5c7b8c77405f5cd6e24c0949ce1346a95859a4bb8311e58fa24fca51ad3796e58a5a1e1b1cae30f8c257656ac? 7zXZ !#,X ] b2u Q{LWsKlHiЍp/ 1:lo~G2&QA LHU6'0)Yj/=1hXTCnk {U\A^1VHig?](7'5%xoЍ oq OwrǠSGԱTph( ".9cFǧm55wT<{Hañ"O;B0Sr@AO-Z\dʹJ;Ģ1# ўT,nsH8nqF2A0qSiFz("Oz˗^ d6 9 I:*_޴KԻ"/?%uC9)+5͜8+݀l3ܬu{xڢ{Tgmq:#(PymcYNk!P,3}Va2ek@gNXLBod$D(hp}qI)qr trQk@l<Dr 鳯%嬴;&q}P<厢dg6 : Kv,b;L_OcmJGMyȸgF-ġ/U3FU3a+qcʕ!$x8}diig$?fe_~͍ {OS>,hGҌ'kӽI/AFn神ytxq&e4:[ʰ.Ŋ꺱G FU7C*Z\O%hsuCļ`>w`F|.S}V ەwAYš1^&:M#_ :Lef<.^1#>Gˎi,M;^~ԅiGآ\z^&xgEQ[{t=Y'1vۯl 5``rK=Lkx2hjFml>vt⨯I/tw> YS% yȄv@bNH+{nH,КTBַ6܅ԭm}⎎>j qJ4@ Vn7yDfנV@bpג[Z"t\sݺp{Q$ ҚF$uI.z&v-|SS\o3ˉO]:IZt>]Is:SgB\-yy|ҸЉ! A=;T9GBLAf7زS3VQTMqoCm~[=j5s DU1A]EޅF$6s-A:'JMvZ/D5h0>6żnܙcʁs"x+\?x9gyX^$POsy+0~c"B6]A{8ןļt'/}a @,$"0{Mxxcx2eSNG0(gT/(.Mob>`mIv0E΢${ea_Me_(HpYLP(@~"?!_v~]Ns+Ś!2ںh4f~uNħi-θ,[%.+x\s&hZѵaMrm98RKA=YmvRYگj[Mw4aԲ`2CGPŐF</PoHvJfhc0^~SHaChbCL#7(L0fe=mkC#GY+gZ훰E|wg&qxn>,jjYIx<T#{P-cYgxKV,_bXLh{ A}6g_eR2ª'=iU̒!C+ ̎0c{Ȧex'$-ow8Aתw{LrC4+# "."8e{ /\LZ1u QH'bš* SHpݪdU"1AǸnR4qD?ᬄTf 'F9_NJ::~cL Ip锹b<ߎ3A0w]x&B e*Z.ݵ8XLȱC`g)m+h"&YvQQRUߣACg>GpsĖ̈́ aQV 24gJ/UWoɿ:Pv8;h}T.<5 1̡!7ao8Vy@@ޞE6]҃ ;DJ)YpU [ɱ\f&}U{xxēmqd PE t[tNHx6e ۻ0<~[\R'B:<}6tyrEJ ju$d5gl O~™/w@!&GPoLSdhEv JBgsjxctgaCph?+zK3L9Hw٦ Z,- ∫`j^EZiS7k^pkREyf2PJU{W}f(:m;jOMKT7k~+n=;HaOX  xWʺWt3QDԇQ`@Z+ u_ΟT $,] L(V-?DjH]hzYɱVnw면.-OM*|Ⰲ!uyJvx1s1Ρʝ}vƿ5 oKi RG8,4ׇ1cB- K}Rf|XIU{m(n$=N 2FȲn%Fz!+|C*c,*n!hWa=.OtFu܅@ݶ6r_00 yGG(#iZeVuȧ79 ?[AFF;}F 5EŰ6dی_Ieb-q  bYcţnyGa^yj :>If9(ȣ?CeoRPGVw]GufvܛHb k,3/:k秎7lAOwSK=_]_G Ilrh_ԸFQd;O$T-w2'b.-ZrcM'3l6**o +8ReifI%wc  'JCqfbܓ&=uGȟͻNPw~"զd#)S#sR#N]xmh2Wh*ANISg=a= I-ݼ/zseʦW.Nj/{[;|HT_>/B:ikgG^ބ,91tfP8֑7,݄QUr={hl0V=WF n?n+#Vȫ:A'SkVH]cK7sO(Zty@qfkI*xH  kZ@e;W qAq-rDsSWJ^^A#xpFp<_{Be:NYݬ>7sɨ  w$xr& ^:]#tvoFd&Pwf%/6-+$QGeЬ @ҙB&iyc܀6VqMnD@nܓhbb?RL.՝u+KONS+tC.'4BԬ /_%5wdHCOFPU(+QenWz^zH7qѻO&XܑVp0Pe9_9d^g*|#rF72mPv-u<]3h :YZ1+7,i_m3.Жa7eQ5M#/"XʀHs8*aX̷nJr;F{(it@Fbr:y >)?Yv6J}B.Kgo$^ޚM88GN{r@UMw4/U uueOc7lVKXb dm H7.mC򏃥2zb%-Ev#(kYLnx!~E߬D4xCRzH3c @(qI変GNg";5jX! {q5<{XأB >I NUld7W$34 Ɉ>.45gWsLqvW8z/I1c_9n9_Y?G[o:ܩ :(j5D$=35(;o:z< e0OTz ?'>ksIO:FXQR'sl+!K;`)Z 4e@i5'RyC|B PBҨ("c Ettt=2*2]Vƾ_e}UAOEQf#[%vsS]raJ pZoMM3Rl-Ϛ=w.ص{D:凥+sh|r_jIz c߬H0f e ٠]7!EO#'D04}Ӊ`)pjRQ\cp(IaK'[en{"GK( 8j73}$]d_ If1-WIG4![;cD]^Nrn stDpd!%ҶE4 X ötmGTxi>P"YW#!QKn*M)AEgFS ox($ئEB:[@jdU9Ӳxޢ־{!tӵCׯ-hq|$/N߄pUf'4S3=xe&? '<39-" MAa旲z|Bs+I_+-4jK1X$ynX%vVBԱ YZ