selinux-policy-sandbox-35.5-13.oe2203 >  A cQ4|W^^f:m]]62g}Ȋxݍb\k7eϳTa+$͔Z^h1چGYLQrF@1-h(@=+4.C+)iw7lcB& oY k0JgF-COyg@*;N&1&e AV@'|}ʨyM3,O]vQ 8K;n>_e5r~ &Wb434f275dd819779903f40576b4c94301f6deed5284ad88f33542fa81d15d29bec2df76010fcd7ee419cbeda23c03fed2c48d9449@mcQ4|W^^foA@+xd#8z;!:RdQ?L a7JFlUrd͂{[*`&IES 7Bm:$Z 8Ӫr77-p,Z?z"FpA?d ( ? 06=S    9 <@EJptK(89 : >E?MFUGHIXY\]^bcde#f&l(tDuHvLzM`djCselinux-policy-sandbox35.513.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagec'obs-worker-backend-test-arm-0005WHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Wc'ab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-13.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-13.oe220335.5-13.oe22034.17.0c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch/bin/sh/bin/shobs-worker-backend-test-arm-0005 166354560035.5-13.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/5de273453e14348e59c8fcb853770e54-selinux-policycpioxz2noarch-openEuler-linux-gnu.b utf-8e6a41d86c9e899006e0f4cd1357b6a5b78ff922b04d19c9a1ad78194d36c8d07ff41b65914742f0e4bad1d44b6452bb8f2fea9f4bd9bd5e5e797f52ac05c000a?7zXZ !#,X ] b2u Q{LUOnT]tOyQ A{mKYv0ڗy8YYVd捡i-Fz&puvQmVMBU^ ,pS@N_z;% G5|!dDŽZjl9YdreSO=%qfZGcqȐ &bӺpjFhF& xQ2 }(EJB~jy=8vyA)_u~`Mno˛FC =ۭ\/Нi/X)I*Cq"΀Ad uPE?R'?x(nbt>D]UB DZaTR۔"RF=BQ`\L_:8Qgwlpxw^ߐ)q;˔{eÉs*kD0軺/lKs PiOpѡҠXt0Bo/rvQ]q±;C59Qf9Ok݁5'eu`Nv9L lRCMBa6UĞoL$ΉT3Ա`ƸUj1ƠO9#Ĥ)-NG8Hz_mŁgƜWnㅹwJrt{hw޸_.'%f~PQ8 މl T͹Bl@'XI ?=+r){;Oj2M:p;녣G퍟hAaKcfy*Ly0k-|{gj>A'|:kͪ_| ʉa+{-w~s'b_ Y rQL: Nz JҮbC(r1;A܅~|4KPy=-Ɉ>٥)+#:K82 ƙ2O3h' rRjŴ&JOS@z^Qd5cjӞb([.Z|NdEf':Cr>n}](hdΫ| &;d,Tz%2@sVˇ~S4Z݈^SkltaЖxG '6l{1ڨ z W!{з/F荋Sz !p;Rehe8Z~b,˾x?X7H*G\"QDʏNI|\xgDs^xw8jvx3fb/3W+ 9@K@H긷¡/3E"rOc{4IKѩ 2StDq͛מ@KqD%ǥIL_Ef1"ď5Hp>k :]=OOQ!E ~\tgBܠ+ջ>t8yKV6wPB>wݓ!'Ƽ8!NI8jJ`-\ #)*J ?>R GxK%7Ѧ(1?6F[+N59)}h2XR*,"oб|ҔL;X^R^m~QY-z Z3p^ d};>ԄaPc"X xdUX"X2'čto܈n2-_X)CA_=.%_] >R1WbT_8Y~aE/v_Hk0zGrt5`hpv`iKoMV xC|Co nz@LT<>N~STPmk #EiEX@Lm7BȡasƶSA,]dqvWgrN8LXlO«3ggޘNB`qfsIe{IVog/%xv!E^I Tk3:#0Yc S^0۪=HXa#z)-PA}}^w2C}|{$yJm)&,%z'/j=R ҳF߉>Dz|:1XCh#_ !o)-m ]>G4om="[Wwv';WPf)LGD828[}fق١kɉSU -}m3-ZV~`c l];o$Ɏx =8f2<"RtR_c(())#!뢤G?6fJT4&H?K[0?lew.y8v\@ϱ}OCbKBý[<:p!sbvg^z^k#k-To/*6ΐPhbZ ) ѱJ/qm`~l/Y:6|; FBq}c*^rɾi(骪 II2* [(A7"ZԅkxˈGR$WdaK1Mº"`(\?J§Ԑ2O [+͹,#ZgM475Cݱh2ьOYH3)nu> rH?brIU\-F5C^ B"e%'*,. ^{҉\Dp\dH2x؃Fs%Ôn qp@˻OcYxjTLo5Xg tRra $]D^jm l/C?<*VT 8jІ @r:[isEΫ2@g_hnٮ jp0$C!w*/9۷ n^Yhj<•[a}_7_ -RFZ{h=OB0)s,^qNW3$ʊ@3[#" Ej|onG&+jG #`3 q#U~ۈg sm Bg2'(qF\rvH [AW.C <ŝ#0*ltĝHmM6[q'Wd.%5(1#(MpO? Vd"S,vD߯7r!+Idr ("BHt[X}р|Z3 pe"ڻV ~y<`#tk<'<:I[ g<QJH_w`tXYTP@1ӏK c"$Jh0~`LuKgt.N0k q>{ ֒oA v8tg^'g F&c(m:E FVjpҪWySsr紳܆Rv$|'*n⦤\AvCԟvVKwt 3KO/N/|J gdUL$Wْ>> [1dW>=BHځ 6lɞ<(adH` _;&^׻hhr;+C q7cѤ+ٝrE,ؔqKPo ݙGT7dЅV/-{l+P #pQyT[҃D2#śAJoX5ɸlE\)E 6VZ[a4=%g@2 #qz`_:©2Ϙ(Cj8cLK$Zɜ S64~(l,LJV2݃]5 Ki"->U?sUU Wso߻1etne'}[4GVf)}cmu|UY!Ƭw໵tC4!HK>ې2C1&Bk[ܢ|B.bA4S*9J idbt.cd ɜ`!> jPk[9_P#}0nY$$IR+_w5#CҘGJbA/,eG Fq+MR2%HLw_`Ђ߂zm89R؉Xb@d%=*d+svgm/IӚA\]rt(Im7b'Q Z~'E  A\ݽ\i1[mkr"m#I~DfZ/vOnx4dk (p49maguԠ%pYф-JN3pJOL9#]ҍ YS>o,rty+SvϹwlJv5#u#SY?b!;CN'үWZAtɝA$g fT׊XVZ=4 F<&+iv] ABi 767_EgI.`3DY9nXn@ ݐSh %X}:ߛ삳<0wx8U*:ܷn6-qVް=x#1V6=