selinux-policy-sandbox-35.5-3.oe2203 >  A bZK$f3j9&!3U~GҌ?Iga1"$U_K %cA ,EV ?PN߮J+gx?\EhW3dPD?&Ê2pw/;'rݗ.IP%~Fsnwė}rV3rs;) l2*Ϙ: LOPm@ QD%޽(n@fAܐ=8Cd0b125a620edd164b40b277f63744c85da27b19d2b7b79abf3d2148afa7fb444b965b34ebaa57b384ba879704038d13ac8c59f18BbZK$f94!BF؄EskbR*# _&*-%N.Zե:_1J"*xX>8pܼȝj K?I&6j.@0)?Dr.qZ \jseoxƂ̋g[jgxAvqʨ~ U1UqiG$mP7N y4 ߻ۘ"ej~9X달 ,&;mٛ:N 2? Xm;X>pA1?!d ' > 06=S    9 <@EJptK(8 9 : >?FGHIXY\]^bcdLeQfTlVttuxv|z}Cselinux-policy-sandbox35.53.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagebNoerv-obs-worker-11WopenEuler:22.03 / openEuler_2203http://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0WbPab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-3.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-3.oe220335.5-3.oe22034.17.0b@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@_cO_Z@_H__@^@^J^t@^p^j$@^ZR@lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57openEuler Buildteam - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch- add allow-systemd_machined_t-delete-userdbd-runtime-sock.patch- add allow-systemd-machined-create-userdbd-runtime-sock-file.patch- add add_userman_access_run_dir.patch- update selinux- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux/bin/sh/bin/shoerv-obs-worker-11 165912952235.5-3.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03/openEuler_2203/68de8ad6feae43395be520c8bb0ce693-selinux-policycpioxz2noarch-openEuler-linux-gnuoooI_utf-88744d2a7846c4f3e13eb327855c295d5e36e446d8dff9f65c6e0668974b7b7418fbb59a617a7f734b3a01c4ea6a7034cfa548dfecdf362d97e6215d8b3026fad?7zXZ !#,X ] b2u Q{LT1j.y Uj(5N" C(cd }\KX6gF f_|+[ EK }#ET톄}ba{&JO.GEo|A00 oJ876)$?X=Bd];ǶV 'w]?q8*.rۥ`+iIgaG֣2 x0C6/GŔXRjL?AH>`]鲒nYeϮi'ԤUii6&㑓ħVz~f^pEńeQZ $aiU`n>.k+uHWͰuΒP{+A (7=8}' <\ 0D3zXFrɕx96he}xUuO{_]zfPdJCFa5c, > "q!55#jcH +PͱT!ʇ , |iP(;o,(?یUR$ 11Fu p+|RJtK㫟Y&~)Lm̙8`ĔNw)]={#&a$ni7t}L&e ; mbnR+ۡ@g?ǖŧ-SsoT]'N|Zyk4 = aCSsF{;kS[Ȅ]V Y\ ^sjG )4jE8O)3wx 0[i脰ER}_)P'{_ACʞ֒X 68)c1bge.EѺD5ʠ %g}gxFM9r3Kc-xbX wj7Lٮp2R2\R9'un%ƹrʲ]r_"ڼi$ca_2k9 \LװIyvТ%Jcה-oYZ2=2WD`cCTQ\a7J  df9/ڞ*;ad@mlU{_BR+aEtD:Y/O;kZN0zӉmB(K 9 **ЧU3Y.rUtמrlpbiw]U߻,NZV} T]gp\xST6QďsI,R%76{"ϓax@\xm#wkZ() q,c οHc%Y>U\N*G{ Ҷ2 69{C"Z]ez#}8\dA{@F^D}! g^ٺ unc,ʙ;3a`@ jF,R^vg No*+^/^KqE ӵj5{͐JU&K#ݎZ=)DIe;wH9"khQ݊/ 2ڔox8xwyu+c$P&jy75S̗1OĞ8=0\ 'M3ZFm{xѮyCWi?O 2F=|aw_%\e|g-Nz+T_wW$E67QB_D+McpmVIe$E5+pgZX=[Sf:°ӻtc`5?|rt~ L8 Ǒ{H#bEcGo oUϗ(؛DV ɼ_\% oMƞyvbKD} G?FGW-h/H9pxvҨ}=sw~;@Ąd*O(>rp{v=gv)J_ V¿S5 J9ـ,*\0݋r ;$ky7pa/@ݺg |L\CLr.$P\#nf̌p#^Z~>/bgIR^\GIn.>(k>YVK5!%uBeu*15z axUVD^*fcb4ޥu!l[]LaYQ-+!O *9 x'R,v_3It.M;o[;Rʏ3RjM9&z~b4OFM|Z6t p$=B{U/K a'{%8Q*\NehEz1#&"u*?pokU[j!`r4-8J1Bs,!fKs'oq572gQ8`cNGr9_wWxػRIEa|  F~apR^ycLMյY^ÖcSFJWW%fBP3o÷}% &$A ~[mrhw4ַ#P@i]-}ݩ~XdA"}j(75H,8+1\؇XLpriqB6 O~'vR͡=aW_jGD;o54"~xcOgOd U?NdPpr7 H/,J;AS%d"[z dZ?p>jTZ@\OK, 0Mm( V'#bM3)?p}rsU6qwKT;R)3re~NWsuw5ȅ]tg̡(kW*Lx?`<@=ӁUS,1fT? 9GSyGҌR췟B .'> 0LwVjxhKFsiErH QO?( d?mc;xYxPjQm[{z}~L6*VvӮd_(MyBuqN52ڟ$hkDx3]m]G% [7%DTBZ?laA/WrE=hcb_db<(np}`HGhr%ZԌՕ䤥tQXsp7; wu< HVrb IQz8#@uE>XAF Wex[r#;E[ Տ"):і\`SukuYȒnQ;%y -&gp9pR_QOP@ & ׇQX=lv_2e2 WRoe0K8sw {bxj/c'wXg a.ds(5]ӵ#ԝ4ЅYp鿒KSY}IrwPVn<3"mh=.!-/vpj_̡y$$"j<'ďEtOpHJ4čAmqVAZe-{ ;f&]N2S `i(IxYx`$M)=7xV^vW}otreB6.-'caecK r1s6 j TNż{3rc'*Xqw;" W0Y8QF0|=Lp`ŦӸd#@(B["wa.CM+]{H5 6ɋa+HrF\UQ*u o`K25#o2ʦ"< FJ? Jw%/> SxhHq?5f##NSA_ohEbI@a9VB.m [X]q~bp8 hur1M3ݠ8J#4]܅:Qgan9¾3]v̤r\v8'b2)YHܯ.#NCɑi暈1цY>Hmqjr:A^"N-q8JFG];>E]t"i&MGv y$dky?U !6Z]H vv~@4b"4Xw\]>ކ|:Z&IUP-ߨZvVN=L(:# [3 c`y8]DwTP"F~CF'_(K 1;Fkfck])G & e z Rh>ԋZ"I7PE>`tUlT0 u?} { kkl`0}^[5; @imΝ^^mPG| IlZ&fJ$p7BYf\n! ÆFm v/ - ?M >I>l ݒW;\>Y`!׸+\cf}(?GaF6T[!6v̒aU %j @%u.7#>дےHUoA+MarXwzBucTTi:>e! 81SD~p% N0@*C~ #"tVEil{9K˽[ep> w 9'׀3v$'(]:ZZ_\NmC5ޯÁS;^ф2 %c[[ a"w,gsP2lWt` e_!dV,6ldM7vǒx=y'K SQF%~y.Ur &-R3]-xt(qn"?ߚ(J^jH9Y锵6})},eP5 㬓tMT\6{Q:^/gX_vVνJcg@ɒ7.纳.ߔ=NK @?U{-؋UH ȏD-\?쬸z ŵ!ڣ\kpfptKp)Tox5)n3cDOp"]c93J^u!Yn-ň 7mp F9m_әZq4+3kMKC9O9k@ &؏^ۻW:p0i /k.߽09Gޒ*-zzT&8]3ƽ` (qtO-ihm&ߌ3 zyݼ䇧ʘН,xn"嚕-8\>bF'FjG:BECgMo6vsRyn9Q'csPJh,? nHKGXp؟4/drP'tTfOeI2Ž{ m3LFO7o8z.-❧ILͅ,FF kdH7B[,];A+gvWEc)5uܷ4sbc'D8,+5[ d֍L)sJ%\̂iuHw,Txk/%bf 8hl+U!N*RlvB@F 2%h%FJfW1ZrT-`ר8~bb}d/_Rv&ǼYeu7'۬!sjg[LdktN5:ޫl-pV-N>1nAKy+%_ܓMڳ>GI7wckcp^*N0at7beScnl2;zrW#:j"h!l{(-o43dB۲g jQ#N^tU& ȇ$6u5TϻckɢEjfG:tW'ڧاC}]Ig OEflE!!f?#Yl:*$g_mvwyU^cPDTXݪBw&!ȭc՚|#u ri(nxujs^"A 0:iBC?J&ZQq*ZE :J8TuRpa;˘6_^ZEVqbQ/%C zY<(UIVdžc3c]18H<~%__+S(-5&: ￰s]ʐ\hbEBj %/Wr]<-NDBИI:@~nı%Efkz9Dng%|_3/zF,SR^y`yUs 5V U8yIL{"?/0* ͢lSkLOhx}3}|`Oxys+H_}`l:Cߒ~Q҈8&%r ؇}_c\!uh>>zI(<_Zs.ƂGkY4NLTb~bسoBԱc> YZ