selinux-policy-sandbox-35.5-17.oe2203 >  A d܋W^^fPqSRr6vڨ ]xE"hQ !P'_QŦgȵe{ρK }+F_#oKɐ9[ԗRg *!a =S=CևbXr\EkRgt6ȉK/M D[ v"gh"k.,NkM$dmh;q't>47CY-}G u7~.(DF}ԝ% b'=rb+VaBm!1A`I0j%Gy?A<=M)ڃ YbL f? zgC0~ -'^ :,Gג|JX>pAm?]d ( ? 8>E[    A DHMRx|S(89:> ? F G H I X Y \ ] ^ b (c(defltuvzCselinux-policy-sandbox35.517.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagedobs-worker-backend-test-x86-0008.novalocalWHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Wdab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-17.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-17.oe220335.5-17.oe22034.17.0d[@dc:@cQ@c(Yc#c pc pc pc@b)bbbjb@b~aa@aA@a7T@a*%@a&0a@`]jinlun - 35.5-17jinlun - 35.5-16lujie - 35.5-15lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71- allow init_t create fifo file in net_conf dir.- backport patch Allow virt_domain read device sysctls Allow icecast rename its log files- modify the patch name for the problem of vendor hard code- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted/bin/sh/bin/shobs-worker-backend-test-x86-0008.novalocal 168851520035.5-17.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/a698bdf333ae342a17ecfcc164226777-selinux-policycpioxz2noarch-openEuler-linux-gnu0> J+outf-80e8df78f10174ef5aa3efafe270f9427830cd220a469d9ee7ee7a544e630fa3d16ae16b789b9afd20ad4cae57e26d9fe253eceaf06b2de8140fad62b04c72f19?7zXZ !#,X ] b2u Q{LWnY-Rp]κ#FYy7֮Od,ȪMrْu*]6nUGm"MݟS=}⑀άPi_P H,yr~'\gOO8h'afng'MdJ\g,f]8d&-:Np"6 HWF `t2#E$%{x eLXE)0wr=rO֐"O`0{3"X$*i?`)H6` _v;hIZSkl"PS)fF^djY9gQxc*̗%o32\Q2*({ txbVU*Qg3~]>~1~U74k҆y7G=I7*>];Q&Xz+bN:r`1zg6T^8S1<5uwn?pj.20t%܂D¯PpCp<.CT1V8y=> Э/$A_-yXu | SUF;P6PYH2P9q壐K4A."LեSUOd6IQ"WJMr4aC/뢖a@\}Owiİ̻ vA[UcxpY~8sRӘSYd0'BF&ik 4p5NOdd3S8 /)d5z`?TU|K\;-i]L^ d׺ۇ4*aQ 5*i, F[CZ!-Š޹G>De&t&I{X}q;h5Mb;K]WKipnJ僥h>(O*rk.0q3;UҎ?ZLW}΍=SV^D2qOЬQ+ w 4.fВO:q#LmY?ę*J&\v; S\!mAZPGyve q?3VҳԽ`k g? `wr*` x&UT݁[>؋~m8wqFJ h0ZbV)cBce]\AYJK gIny5o7$1072-4J|Ҥkr˫뻨1/B|ɄuAG27,apκ!m6޾PqX=,O\aUbnz\:|sϴ؞+x:,C\+"m8-BflwEyr(UI3nwEiCY/xD[M˵Rv귩2L&ZD\x|:KG$ +}vS X ]u#/(`z >&-J$F`q}0aQI8>JjFQFPj08_!ZE+] &v##}DaeS f30o \ *IyP(G[DCz!,` #()=hVKɴʠ n8/j6;s亱mTOiR X;:>?3$/o4'đi yps(3[E_\:N,L4Nʿ zgW@$b2x꬏eM60(<ᢙǟ Ńoq&(9%A[X 8\3 8x貟s*s :)W @&$ԑӪ金4G)vf=/fuA(м :=Ӌk>Md5?_ Wj~ug+<"2-?RS/n*c %V!$u)gz_^8x~9|&j3{Yٱ%Ujcb`ز:91sk$U`zj7ƻ``@f^,&%P9W3C˦Iڗ n}4hOpZ ubMR;!МICޗAXWZs%q-z{cJWj1'W;SL2ߟ40Y,濽JV՛&a4im)hۅ.gD˟'F_RۖA5`er}'dM/ Mv*SHנ޴b2 HY Š1jzSy$:/y PƔol }җ'5S)vϝ ŗδ%vao5|>A'`ɰA`nO'F{_]{lK\i"ۈϏDFVQ[GF|B}F&%wtFBųm1& }Wm^QiT&e1Nnt?eפ7^g[Yt}gFKYշP/ `8o ҙf3y8TK7%z&6 H3a`ڃg~$bf^AH dUE}^p _#6%?l Y{\ȶ,KYR0#,գgN< 2w<j)R+,5$/h-1s,u zBN0$40@f%bpS(9-jqD֥J:Zb2^6ADgH6'7N)C)g0GPk(yCxup;PKWhS?G"U!ye_Ϸʏ,`;DqV#h$@ .?^i:\LnkҁˋI>af'hb]Wbo^+Dۧßi MH(EȮH)4%C΂@̜z7*;rmx l,U!Dq=n߲ȒLKC5$﬩b,0& :Zf˙n+] l(Un*." l+HzkWK玭 .V SZ5ɨAADBLP*Z߯;]x_tf+@a*TT>x "1e[.s6>{#?Os~VY Vǫ&k'i&͇lq`K^(so{e& o  nL͇UQ֊SHh;죇ܪ)`8 3*mI"7$h|+aw@gz V%"%pi[Ig-TEDʻ}㥤gf*D˦֬]J8߰%lCv|v\*O%Ô GgZm`t+23ر!DU 1A֧M.BkLwN?" oO uI[8FZyxh/?~@a^~~Bfc#X^_ Ff X{Ḁ2=)%E 'd-*{Yg|͒1a!z8q+"ѷ~lNBR8S' lRPeT&3-rWERdSW?-(^Zim w+uP+-"QH4?VXxQ "3<´PΌ ڈ"_q#BNM69 ѐ֑×d[γ?,9~242@G6t(?quRLQ%ṭc[ Sh}}+4FH!lM8/HD&,՗^)Ξz*êRl:h='eW8?#El,rjg4[M* 7 yGA/$]2$1?lkqL J ikT:n͙nSÒ@ZewgZ_pdB]:J=g(c6}ÇAGWv$)ht~!)G3#ɳe2FLwWP7O/,QcӶŵfv^S@F|A3sál;O=PM%PO|-oXIwR[ғt>'0D[Rwna@r(MQV쾨{ې-r]o8?S? T@Kb'8W1!4n2j8G1P:(g4Яu\ veu{WsZC?en>(pj;fލLSp#I„TCm96 6c CәxM;#@ΐ|(Hg4Wrg/5Wc&h[2%1*:iކa \a'ȒnGϗ숩|_@FQeܬt~:]NY/;pEbܒLa!$.p Id` LD D[RS }%lVW$' 1g|Wn(Ywi㨢w'%2ܜF9P^v^f8/wQ g 965 Ux'?ۍl@>/M`(Yfl& yF 6g+OdG$r)7ޭBf/n*t cyJɷΖIC<0(ӪXwݪ#[dxg17mw5 _Sj$g O6D`xG% ENHBJ< dKj#셓ÊT=_ c\*p:m+1#Q] -ysθ{$  \-9>'r"aoUArm 8B|~tQّB9 cH3-VXUrlj- R;VE7k,67"|^)ˈ!F؏vq13$>SPa(޾`7/XvHq+QKe*:F:ǝsf4#ts[@I ɴfSZnD7a`Dy 0qM񷿉P*n1j/n슲 }tN~82SnG1k}e7Ѽ)B@3=VU>3Xc qT Όgnc<<Ib Uy@ƉZwf8%>6Qv̶F-< z&7&)j 0`1a ̴=KR'1w0[.[dhT%VQ 7sj4H*9ƨ2u^{F %8kDd޸%Z=k^^'[:'q`|\fD:*KyH㑩?Bkmb] X7Eo-ř$ի%|%30܏(wŨ%)EԦTqw*c62D#yP-.A'@yihFlݖWP CE PFZqu}QzrΧO\F 9t,cL5T>B24 uIfv}E5J;C`U=|12JzΙ]ub( x}!x2k'= i3@-}DatǞQs3HC_i ~&%>ίށ@+/BԱc> YZ