selinux-policy-sandbox-35.5-15.oe2203 >  A c}6\Lļc =mnFX>pA?d ( ? 4:AW    = @DINtxO(89: >?'F/GdHhIlXpYt\]^bcdeflt8u<v@zATX^Cselinux-policy-sandbox35.515.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagecobs-worker1639015616-x86-0004.novalocalWHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Wcab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-15.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-15.oe220335.5-15.oe22034.17.0c:@cQ@c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$lujie - 35.5-15lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62- modify the patch name for the problem of vendor hard code- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5/bin/sh/bin/shobs-worker1639015616-x86-0004.novalocal 167002560035.5-15.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/ecece2f12c5fc11ba498c5810e205b94-selinux-policycpioxz2noarch-openEuler-linux-gnu%W$wutf-859cdc1e5207fa5baa4ebaff4d72cce2874d07a5dd9e78b576a814ce62b2a54396da4f3aa997fbaebf274d2d12afca673b454fd8a10ff7fe1808ff28365a27a57?7zXZ !#,X ] b2u Q{LUW4 q\%G}S>]Q/n};+(\k+XeMh߃3^Ffz;`I=WPMtQtkKwrP.KY 7$d8i[*m M s{e4#d'&ct+Uok?]5" U@HZ P?LJDhNd?hYu3^U:C(1 ǼgZ &6KQo-hքo4U}Ѣ-&߼e35Ej*r$ RBW=Q+*<|5%fMY_ŀvak"mA/S '&T/Xs\b9ۯ85Dž+M3%G9NuL&1Hg)%0@*.V5DgP/* ?:W,/ {ez̶ٍx#i?;UoVס 4R}G3#B 4X@ĦH/ymN];OPKD򟟷9c2=o!!7͌W\Jk_.Ǫ6m&?cGi,'b.iCpgIJ!Gy<\ϸ1/%o3 V3m n9A(V@؊q-U!-+ |ܐM N7aa?LwD~Ցx#J ?$8AQ9rvjs~HYWG`$fCZe'B AuE\9:-Y& vd1"V64#oSPԑ"[!xdƺoFW0s/Jaҹ$qk h@^Yf)VUBٝAMbhh)N?P6reWq+:r2$hk.hjYB9?nz`o?*Yub7yA,G^\-ol2B~މ"G@zE M?)ʘ3d M}LU>. ;(wP DHSyf4vn?Jq&ՄR,E#TO:t!w !guMg`0Xl}c$Ԙl-L Y ^_).+JDŽBZ9:k%ܢ9Qh${JkbXOt'%(|dK69 Ys$PLma!p2y i2O+yZzrT$]"[v Q&}xD-MC9VdΧ\ro(F6`8SFk<- 3DD|."`Eo)3]h1y2?vR؂(RvEތxnoLoy`r>jXRR 떤]vNAIq6@bS(b:HiV`C @R );'ף-FZN*[To5bΜGjfcO\n4|ɍeMQ B2;X_.v(T;~4N7~ , L il5[q&t1Λ9FK ҫ3ab614\iUR;nnn/K{[285rIt=aw#JNri9wQKR4?$CCzs"wWY1kء4vMWMOzư6Fl9" ΛQcJ vDq Rk>zK?5FX(:P[=[fM6>`6׽l=|ytE0#]ov=ȓi7hn^u-&6{Mt3_*jCjDh*H Jr#2vj..A_:qOu\Ꭾ(J*^s!66jɣ[ś;\*ѸYp}vԫ +QJ½Uj1Ǵ> :x`P-154 *C]*Lbt~;}ZKSL2;N'A(F0—`vP˥eu+aq\Ypa{du]W[OVc̾KʽIDffnʒҙ IZgy ϑ":g6 +Y;:1rLG,#>]¡3d}J[ @ Tđ=V~~ХU,dۊoŐ'rvI)oH_bċv &4Sf;<$$tuˌВ6t:z,_bŐ;CVlJK|?Ə7 SSUa+ҍOOSJO"ZTV! c>Z0M턠'&LG,P~l_z >{7_Y/aߔ#{H*e`-Z6 RMGwr{k,+J2wȀY ?LUN8ZWv`EuXttBr*`J:!Sj]!A= AoS+69<=,]G|M>ia\mzNsvB>#UYI-|ANEQّ٣@)om;7Ǥa72㏣TȤQr5ܥK<tKKc upzGNNy#W,Y&U"e{[Ԃ&m-'D$-@ H h< -U4%ݭ+kG N`w]A@apK|W"l.ɰ" C{;5TU4Y.pjLpg8S;3%t<;?O?ŭw S)T|#*ds ffv{7(WT|u2ߚu4mzu31(EW8x9cLMߖ*PQ1.$Ѵ:݉T*JU>T_CU V,.(NLw/bg[-u=TwpOؐK$b+| ]y<;"4=G1B;mZ^G3Wo9<`6؊`CBµփQ-[5B oخio=w8( Kpw2Ur>z+I19*ݻ 8e#֗i^ܦg짢K c<4S%Th}׉v{PthƆ0@|Mv|4OH jGgOso~!*J+7잙۪wYZџ&Qbu4G'QNbr2S{)y xQϓ% { gxBJKEQRQ*FP2jR@bQ[Hb(mq$PnU%y:b$2iF}yŤr+]b"\!#滈vkF&?҆ub Q*ĸ3ڷ;TKN;Sx K0P9&GMG[ͫdhH3}&"U}H;'<İ>:j!k=t)\`(s,n#y٢u⵮X5oD>IVb!*wZy@ڶQ 3l!xLi2G(̠BNmwqd)qI(XhuO>e\\БKné/ؑw%ts/Z݂-hE` o (s}ThPnQ*XQL&gJ~mkNDm e[~8B4Af#]!l7ٱ`.gh\2[@LD3yqT tS l_V+/?_r,=Tz!ZO/yF q$E!W hL,}ls=mJˑؗ& _qC\vY1b% +0I1BzvhX3\\hԺ>)O.32 c^uR}^'拙Kgg'2/0l'2+(jj{),ϗϪdC@l.t0)h_+&>NOAͲz9!O246 V您jRyTQw4I bu]k"ߡ21l"bNafeWPT2F0t=- 罏̴T2VL5ΌeL@ؒ?N2s&5\^|!V1:.fpjs 8_58ųK BQRe:]i&#ɧt^^:DZYUQh̀ts3GR`r#SmwFYiJV rJxי8CoXskzCtHQW7٫`Sg3ёˣ~%5j4~W/:Q߾BM{HY|O}"ppmiVѥ_IuC e$/O݃+M@ʖ4*_W\ ߌ{=] 1r,R>o4AqOw!Jwtk?-&9 K=i;Of|Ua'80_`ZXq7l\ɱ+F=MZ =Lvm}YIEI;tD\Y,RpW@ĝ :۲ݍX([ٛT_T)sve !#67 `h!|=#zJ!PU:$oqq !jME0dAТՉ^mk\ҟuؽ?Ih)GQ֣$rlрL*âM]4”qlh1.`'WsWU7h(ԎvK*_et l}mpcn%r'(@%#Q`ʳ%c~nOBY5%ETYsJ]q,N&X0'giDkq@( Sha74,(ivtgER|$d?ooC##wJt" P+~%/XP*4[$>;UU"),6AgnPE78ī GR'7 9Ck5R!42퀘?*(h㳷`\=kჿ4uk_cw%_@m*6 n-hT|6)ah$DiM/A`}LSd+P&B(z[c7\eR֟ە(j^R ak#+_+8S.yo茠M!*v]U,mSNq [w-=jxn;P,v4vpV"ccRgMʼ}shp6XW$3 at1x _j"VW5N3یO>G|gȜ ɜ +jQ!S;𳼚V8+\RiAk~ "xxz74]_9ZiIŋǨJ\ftb(+*ChV:atZ!/HO+ _<JBbHB 8W0y*(/f5x˧)V[ˆ|y[1nbE\o*&8##%)QcdcDe7oˀێgU 24j Chލ 3 M{݁!1>gYsa84G)(wAG`MH̗bŐw!ft`&i9DcPH"k=ޓ=P=WDO'5dBYjjA#|("@ U!bף$!v฀^˃/ٜJ$%.8z7s.biQ\ך>\T.Bf:c ኏1ƀ?Yag FX/Ӗv g o%P4P'>FWJN業epuV>/:q Y,i# a֓^^nv t]ƟM#Q"}BTcpa|R6}mt[!" 7Q,G) >Zo(r9%b'K| #lA0rVy$v3_FK1(a6:v/?p8ecr¸JwSoɌ9m+ Ѓ܍?(>d*(90qOUt:Ko;WQ`*'y+bl'4sk<9BIDE+,B8 R֖\mt*sTဏezWBԱj YZ