selinux-policy-sandbox-35.5-14.oe2203 >  A crW^^f}ж])@EpsKK49CSYfb ^4dȈwdY:^h.1+_ZRWk1%ambpa2iars:'G0~cJJ&t~@e^.WㆋE^=BM4 &oRK"ppz&O >(P4@.cUHq0o<=)w(d62b431af9ebf4c82e0f7d94307af0f86a856cd5e92881b292ecbb171a459fb128f09f0401f4960b0b77248172f0cafa764151eb4?ىcrW^^f7 ʤ}ߔ` A9r 8;eU8m(#|,6\uh$ -o/:f@~PuG1pAq?ad ( ? 06=S    9 <@EJptK(89: >?FGHIXY\]^#b@c+defltuvz Cselinux-policy-sandbox35.514.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagecobs-worker-backend-test-arm-0009WHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Wcab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-14.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-14.oe220335.5-14.oe22034.17.0cQ@c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5/bin/sh/bin/shobs-worker-backend-test-arm-0009 166950720035.5-14.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/c05078f0521fd0d7c99bfb09865017a4-selinux-policycpioxz2noarch-openEuler-linux-gnuLDyuե)4qutf-869b31988284d57d487df4d08ed8ecacef2c31df6fb889e60d59cf3c910ed325c0bcc5d312819e5e876e03ff870001dec00670e7a747e08762050ae76be7dcf32?7zXZ !#,X ] b2u Q{LUW5KRoYa*G5I;ɂ6k"zK>Gyȸý[5kbZ$FEW<˪,-3{p.;V"ֆ8p4Mx_?QPCU6O8l58b U:)p>--f~i֗u~q(] Q.gH"&fMpm&=rҮtfoHWnK~>\o7=8NVM+ .8A$)BR X?:’%L edհ$/vw'a 0]#F3cH Y::L&&u'a :fҦ:ؙQW' r;R#{*V8{T6>Yׯ&KJF/t'Kz;|5tZSGV*a@$FrK1W}1\c懾:81쮚+o{y|_f4l-kP`gÐ@f:Z&ؾ8YwI~ L%' %w=&;ϫ7+ sC KtljR_:>|Ї+H4?ӍsxS+:z˒adsAg٤mJP\@[)e_dA0'nMfh%ԋf=dJ)C "Lq0JO%x!mQB8̚2n* #0\.Črwӭ*#Ig&-MivZum<&ɐF{NH8kTqOʪC*Yk]:K,=I4k[gA'֫?n(-7-|u-':լws [yl(B c:Y)0uZ243\E<Xڭl~|bW%eF`/bnI^ pN2e,SkpB*My3VJ+dDU- gV28]Q Sgl̹q^)[12OF|4r.dDI9Gg<{} u&4-!Ryʴ߁ tW<&#:LaUDbN e?]\W7G;έy$pt# &- JC\OӂrN2TQ@%brk@"^ R*:a\J1k55" $9 * 7 R@+d0l5vuڑL%*;ˤgh20F}bVE!nI˵_ܡR`TorO4kCKe Y94܏~B)')chTvHe1P+8ݏ Ts6N,hZqHIhJrV`SeT <{BQݳoPTpt JO5 ?j`Ѿ{sX,mQq} y"ϸ| D+VgߙS<.OP2.74.#1rШ"#\ƯE=h T4CJ&A̰GO0})mYq& T]_Gu [_t0w{§$ .*=[w4om.6ar kd624 LN>_4'yH"]wkR;II }ٸB =% 㣐&~b]AꞺ[k%6ec|%:8y!g=:=W> uiہgJ|UdoEglii]$$)#Qv[&[G5ܬϵLjbzKnxqC߸0 mR|8b[CB!j.pj:&5Fy?o7 ,t& kL DDLJ%4"qy%QfoҘ> UdJ3j8)XNd+w(}힯"/ލz^gwφD1/`cX :֧ ` ~f+)|]{h{A{h!+i]۶91O*M뼰\0$Qiw6mfH#PΫMW@@19\<Ɨ f"A)&55Nȇ.t!ҹHEV]vI lO.р& 9CgDqwʝ4*4~icYk+Yۧ+. LǨ,zLR:c 'E!yBKߙ !Ym DtCU/py&4QDf`ԝq!M5 Q{6ˁ3|\iffYHȭ%e",(V\&dG[n(sr%6(=$)J32 !A@]R&H9̼CCư&7U{rOW#զ,5^?* }1ۚaZO-x >mX$U2[Fz6?Ȏh AϚxOC@}Ȥ"QxADaWYy^}8Esσ .7D&0^pJrAs:Z3fy$6wv~!J7$[R,+:1" aDrjլJ`y,& ,jO حf9E1~U4y΁9YQ”Yld7'{'iϷ<[kC39bg-i;{LYE&FTR D׆]F`ػB\JFTlNHyogw&md&䱏 y@tc_zF~+杂`5n30}'s<wj\Jx\ςwy'+KzC7=?jp`ԲAݱ%hg\LcPưU|cn~Z8 k$՚j]7p֮o&9 T2ǾH=mjb$8J< qilV63{U& !U;qW\hоeAoC$6q2OnS7mFʛCikg)rE9Qm X_\l*aFgb:s5Y0.UHkV&+-&1^A\F+0G@IT knyV}#O jjإqbkH)%.zP`JKfHTI$ǴYDmH(T"+$-Kb >yֳMjiJa]9 Fה-XuLL%oR[`;XE 4w@̐@>ު9/dYrntԭlӢ5ÙY>hk 2ۮˉ)؅KpO3nHzk?q}w8R\c}?%z/ _gqoVNRH3=&R/~T{a"yscnQSFI1RX.۱M%A|I XٺѴ#JM$'z64>wd# rl3hPnsVٱhr6Ÿ b}ku Te~ݢi=펹{p+..\*aJmD?m*-qG;RlɾQ@18fl}ȰZ\6}g& qc*,~(]b<ʝ"rDmU-di0y%͞E@ꔋ>-iezMI7jL%ԽD]وsjjs5sT^( r*=1@g3͑w T9 " `޿*nnK wTX)>ͳk#Ӊ 5m:oO<΢ݱ{ie%Ѐvz\8"h dj$vDrz˽pY3s4`'1f*'Hg ڦ&Ewj_ڤ[,=fqfVp-Th3Qb >gUN;PQ ͣ8G ^Rv6B 7w11QYTiZsD<˒s^h@))uGg؜~Q:UuιCA?X$y' IFyX#$?2v6W|_,mVm}l~LO<PҬv&*" (V]YJUՂ6{;!.p)(fHJ#e'!kF;_ɠT^OB4VlxMi1Q,\7H,&^؉yIQS-;L)QMH]w= 1Zua(wf0* Z軐Ǧe( !/tYD53PP?rT `$ z'6nsH0۾O{s5>j ԇGFF2=r Kc.mv;&:0cwOp@vDz^-,p57n2@caԩj*6L~$'~|MP_t~ U:88+뎄ew48]qEƹFp 3\>%bئ_ y~07`_6MT{Yfi1L_a&* Mtu '%wF߃942yBbP !Ow9*4Aϊ23=*?brUqS eG A"գ&6DGO1rb]λ_l%~ $zr q+㐤VLtE|26kJ7FfSK9x6D)[]^xe#E:ޔԧ`A䓡#OH؈} @SIW=Q}jߗDtoxuu^>7eV}bzӟ;Ju%=!eh@%])r9byq8)KG^zJ*=J )*03FC@:%V24ei}"W:*lSONS@#uL}gy1=xys20K Lt BNOmDwo"I+i:$ Γo{xSgsen̓I{X9.#uz;#u!͌5Gv" ń+y"rn>H(];}s: q*U^Ocl{5?J1Fw9epۥqW]_RCg[]\mH#4:L̘u^oI"tXE p)\q2E~&xOAӛ,8V܆(kva6*/UhhJS*@2nN3QscچMzUDLFf_2 #s}0%ek%+3{gX5Wh߇{ӟ<9 K "PL6V{UEYo`% #ޟ4'#~t|qcf0ϳJ@DY*K[qF ,5dh&R6Ru}N?4#54 uL-QwaTш_ t>[Dj&҉Y)`m[9)md#f _bC),]jA-Ё@FlWӚREPc!5Z4`;zCZuFp0(M#ޱ'|@m ДM[xj3Xx4AxsKiw_ZS֧2&,0Go8e_m@u f)·34;a_Wd~JڤQ/~Q@g6P,g܇K &ov$Ѐ]|~d1NyYר$9E|6b9v2hz@Fiw㫏B.y&(O_^yP -Q-Cҫ+ Ņ+JCy&KNKN6+t|^ǎY*ý/Z PK2, ʈ>$+Rxܗj g$s)&̧(+=N뺩S~Oݙ3B3 !7M]*jVdGr *1Kige!UU@R䄫bLIn?{kL7 ieHI:9nuej"Q7D ?17ChZn4yhOcۗ(tQf9fYJp)77@W& X7;HmLSwMwkC[ɽxzu|r%K|{*+.= P=!+s=zA!c 1O;P[ғBUXq#t'P z$G1JWP"2)el1%AUqCx" ]1(v?pgzt~v Pv}2BԱ6s YZ