selinux-policy-sandbox-40.7-3.oe24090>    f ;G|`u` 2 o;;ɣz/B"[Ͼ[Q}K54RH|U515^䳉lfDƎDQ![QGaƌHcost|nFz-c) <9^*(bm;i,Do0P̲׹h_+v@l0wP[($pNn̄uTZc2A$X ZBodvV#ɇ)cJ[8 4x/X\kV,鑓trGNM=iI"*m( C)UCMp\!_WAL{r9qe'B86 =Eǻ->?d ' >       8<Tt(M8T9:> ? F G H I X Y \ ] ^ b 0de"f%l'tDuHvLzM`djCselinux-policy-sandbox40.73.oe2409SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagef,dc-64g.compass-ciUaGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Uafd8af19380178fa692cdf5f68f09cc33336342d0bd9b5ea4b68d82cc118850263rootrootselinux-policy-40.7-3.oe2409.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-140.7-3.oe240940.7-3.oe24094.18.2fJfec@ds@dw6d$(@dJccT@c@cc:@cQ@c(Yc#c pc pc pc@b)liyanan - 40.7-3jinlun - 40.7-2jinlun - 40.7-1jinlun - 38.21-1luhuaxin - 38.6-5luhuaxin - 38.6-4jinlun - 38.6-3luhuaxin - 38.6-2zhangguangzhi - 38.6-1lixiao - 35.5-17lixiao - 35.5-16lujie - 35.5-15lujie - 35.5-14xinghe - 35.5-13lujie - 35.5-12lujie - 35.5-11lujie - 35.5-10lujie - 35.5-9lujie - 35.5-8xuwenlong - 35.5-7- Allow init_t nnp domain transition to abrtd_t- update modules-targeted-contrib.conf- update version to 40.7 - Allow chronyd-restricted read chronyd key files - Allow systemd-sleep set attributes of efivarfs files - Make name_zone_t and named_var_run_t a part of the mountpoint attribute - Update cifs interfaces to include fs_search_auto_mountpoints() - Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on - Add map_read map_write to kernel_prog_run_bpf - Add policy for nvme-stas - Make new virt drivers permissive - Allow named and ndc use the io_uring api - Allow sssd send SIGKILL to passket_child running in ipa_otpd_t- update version to 38.21- backport some upstream patches- allow login_pgm setcap permission- Don't allow kernel_t to execute bin_t/usr_t binaries without a transition- allow init_t create fifo file in net_conf dir- update version to 38.6- add rule for hostnamed to rpmscript dbus chat- add the dependency between packages- modify the patch name for the problem of vendor hard code- backport upstream patches- allow map postfix_master_t- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- backport upstream patches- Allow chage domtrans to sssd/bin/sh/bin/shdc-64g.compass-ci 172700266840.7-3.oe2409sandbox.pp/usr/share/selinux/packages/-O2 -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2noarch-openEuler-linux-gnulĸ+ncWutf-8286ea4a71baa304daef08654ad7b9ed317368021f0b73b67b24f5c7cf1dd57f7ab2e9e6529b5240f4e2d6655f602ec0b06c76881395b919555f8fb6394c95aac? 7zXZ !#,Vw!] b2u Q{LY\[-P[^d47jVkU.!?x^~#F_:Qn3<=Cr nO)8sdzkR7Nt>/݊ԕ;8E^@B=u>s4‘j =a?%4jIs)G!Tԅ)NNdwfj3~*Gfs{h.}5] :&70S8qϗ}:#đaMW(la͉"[Na 󟍑Fr_ox!N^!pai#ӛ @FX?zx,kZ. R$`s;ڐCmYy1-GZmCK;UСyܺeã*K*) ޤ)V? Bu:y]{Qܐ_΢YSC+ &kh|v3kj /oոW"\# ?)QxS\JqY?ߙzhJ P+)1c UIh@ᣒbs6 i4Y~"ٻH.CYh/Q\Y - rD-T0^X;H0SJקj.S5Wd#=L2(><-u,Rt59'NvMqɺ6U5`$˳v\ ZA<LlBvb nfy~q s;tC/w(KYcH|]Wwmsv&}@ϟkUY8gPeJDrK{AY%n ŎeCh^X+yoo)K Vu{muRv/gZGYyPz"] gu͎ Q]Nu{<Q#|'Tb8F#{aSP0V$|,uΗo=R!K~X} $nJ_V:E)\YX4 TP7`.~i[$̡hO=AY-fMųq1Bw&ciD5IGsT a798*%= z~'*ڦYsr6^\aH+ϬyW0TYꤴ$X*8hs쳐JS@qp=WL`Uv&s@P1C͈0%+rY#B4?ˑ*&Fgn:EӘ 5Q:'+f.?c+7فrN_SI?2<6u ͵Qy;(C EH}\KTɍE$xH1e=F scQ /Jr?0wFA=._wjbA)EǴYϽ6c=@jm싴=q/.JYNqሶ ߆ PNdJRwQBsϮmH,\]}3~B巤Y]>bׄ ^w/.5ďD+whB3TS+ $XѨ\"c"34S{?i4a -!=:4>`sa ĖHC`_\Ne%Q'۲ySf8-6ٶK !ި6-Kj_#fRʀ=$j Lq2<*r9wl&I!K]uÔ!ʅP&w/"o@" 1v.H"^ǠR_m[7%'ͮ܇'o|(0W5hk{GtMԔ v]EFy E׉U-@ᵁB%'B. ҾPH߇k MWR{XX@*׈G`5(xڰϙm ?漌axR d]H$`{$吩J rBu]^bai?T6y}-rWXZRnџo*^q0}/;e0G:jr"Ԕԇu=շj{*k0I _5R:7mzD:4ϊ"BU{)Sf=J:YQpQχ/GiZ`˯@n.=QrNGsMZ`}!.d!>NQj=G='2;SR[R.Q]B8MhC2j^*텣#ΩP}n= @ +/tG+7*!Cj֒OWM`=1Swayޭ4Ű9j;r y[O\\\nnnV? ^6o`% )Lm.UΊB䫅I!4FdU5OOFCbG]BsLAgYnaemBiO"lq:`E+ATC *{#ﻉJ^7e%3ҵD$Km̼,r:1l۱zV># f!V} >.~]2uC~ῑd;{;nLE r/HXWQ0BȺ8^rwjF>uZzԋF_AleȄo|LWݸ}eK9C[A^6t3 kѩ<L&S" j8'S<*8r]+xN`;6(phClM[{YY7b' <cs:ϋpˁ՗|֪`I:Hb?2'72Vg75z2 [s Mq; 0Hs %3t_&G/mZ 1{&ԕ)R+k[PE$?3,}ikٱuL_c.)73 @<@Ck#HTfqE"#څzuxɡ4{ŸW>>HC6 nBjc&2qp~ᬍ{ wxB{cdCq-ksc>~AU]oEZje7O4:{ ]l\'eO8Am:4Jd֮ZUB|g2}f[CR6F)Hh~VkPm;0R]X:TAtKT)%Z+@iPݹ? |`)IS7\FVb ]=ј|ǓZ-d DžO@=[>VB7w)之nflꭿA(4Vim]*Q< Fcf(/1sBeH7(S#"AnN#@߰a4@ Hg+nҤ?i鑋r!t3`J6͓iz,lbSn xO_j*礚vsŠ*5"w-kjc:O[+) Db>Ț#m9w21Y z!]w5`BBSHIHRv`:g*؉E|`w2ÝtЎ̛(dzh\EB3'z& ?aFBr\$F\Gq<)LEв7%o`rOz1GGT`S~% {?NARC pwMw닺[揔 i]G3W 훫. +ZX(]&αYEA|[U߅*%8[{fnHi8ImEպG,=T"e$聉JX܃.ғ2^F9+{ }x⾧8x6ghxu_c642y2+U+X3J?^؈7#~,}Ɗ_M=xPXJi\- ۯ&zHK)K>:}\Jm8k7&Ykee^8\n+5ڵ쏁foȽ Rryy*ZldHISDu!iUZD`E3|퐨KNb7!WV a7v0?I&o +Jx f;B.E^8t~ݒBP '#XԮll){7dx &10gFUHnxI (Iܩ&&Tk/C!U}( AF 2b ъx, {T٭̲D2ېZفaZM& Q۳H.qrT8 'ߕg${F.'ˢY9z \kwSMys%C{?ж~A 5k*ln{kOҪTĈ\J17(xcZ.0y# F!? Hb=Aʕ6AmYHɾo((qre yTr߷.쪌( NgMzRs_{*FrpE Fp_5v@gvϾ%&FjQZ5Ms~olWH#CuܟcTLmDұBu~(̋^Ƥ,"6Z Dq#ߎu4w\_=*\$bDއ r|ȴwǨ#z!R~w!?R)Qolh[#Oُgv%^']0$[ 4!Gzbp|KޑNW D|e$>W.DQay)4ҶyĖYJKGn `tv{5 lc;rZ-ԪD9K`*Er( ,'d ko&В3ʸL{LT:B"Xd1`O,^Z2͹rox тaIgO1N5QS. XOLɾ!rj`.e_|\%7{B6iWt@Ŝ bUGC2 b¸;"{(1q?%xy (G.f %V.3< *AyHug=Pu]\{ ka䈲L[Lug};渻9!y8SA^hͧmFG#x^h|&ʴd&0٥xtBF4{lƒ-olQ@ݢ4B,V('i+GKYX3ʂm6ԪneʾU6@K*w?}Ay™`Ҩ̖޵큢w$ q["Ӯ=GHX+] m1a1 וuO|d^ƅ͌[P!%!ږR-"1@3rSᴕQ,;tχ Ωlk3k3E!-65.e)$N-fU h9[UcZB YZ