selinux-policy-sandbox-35.5-1> )lp b55a7b620586176575ef3f460c7e69586392522e697bf3101203b97c6c3a5e3504c4f41da5bc34fdf0d73f9ebf02d40506d6ed0eBz1-2F쇫MOX>=}?md  7|       (H(8%9%: %> ?(F0GHHLIPXTYX\`]d^obdefltuvz(,Cselinux-policy-sandbox35.51SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packageblocalhostWGPLv2+Unspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0WbIab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-1.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-135.5-14.17.0aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@_cO_Z@_H__@^@^J^t@^p^j$@^ZR@^V]^$D^ P@^g@^@]]qlujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57openEuler Buildteam - 3.14.2-56steven - 3.14.2-55openEuler Buildteam - 3.14.2-54openEuler Buildteam - 3.14.2-53openEuler Buildteam - 3.14.2-52openEuler Buildteam - 3.14.2-51openEuler Buildteam - 3.14.2-50openEuler Buildteam - 3.14.2-49openEuler Buildteam - 3.14.2-48openEuler Buildteam - 3.14.2-47openEuler Buildteam - 3.14.2-46openEuler Buildteam - 3.14.2-45openEuler Buildteam - 3.14.2-44openEuler Buildteam - 3.14.2-43openEuler Buildteam - 3.14.2-42- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch- add allow-systemd_machined_t-delete-userdbd-runtime-sock.patch- add allow-systemd-machined-create-userdbd-runtime-sock-file.patch- add add_userman_access_run_dir.patch- update selinux- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch- add map to zerp device at dev_rw_zero interface; allow ipmievd to read the process state (/proc/pid) of init; allow systemd to mount unlabeled filesystemd; fix selinux label for hostname digest list; solve shutdown permission denied caused by dracut- allow passwd to map and write sssd var lib- use container-selinux.tgz of 2.73, the same version as package container-selinux- fix upgrade error- fix upgrade error- enable selinux- update avc for openEuler- set selinux to permissive- enable selinux; delete man- update container-selinux.tgz- add URL- add source of tarball- add allow for ldconfig to map /usr/libexec/libsudo_util.so allow syslogd_t domain to send null signal to all domain/bin/sh/bin/shlocalhost 164601010635.5-1sandbox.pp/usr/share/selinux/packages/-O2 -g -mieeecpioxz2noarch-openEuler-linux-gnuWc2k)tutf-87763536d729ecfbc095a9467494a56bb6b3bf295f36654b7c47197d68aa38d96c54c75ce835468ad80ba212718a6d8a85e012ce878389650f8505dbaf2b6f60d?07zXZ !#,X ] b2u Q{LT( P'\*/(F7W#2o_J#vb&'vި< O=} qy(D}$XMT Qy U$((52ܔL}t< C E"/_Zuwx m JEkՠ%F=0ܖP=;> W}t؉*r{C} Mzt34h) Hn[4kIQC>χI> TDBNyJX7\:VbjtلUbSyⵢ潌SȮ^053RWֈV{t.{AD (AcW7)}SJ֣B Jẙ9P#/qp1j!F!ݬe:>>] 1%;5g"NXᾣxaG(RI\8yF w] S ٰn!(;U 89א=N09ZvR}l{Kw.-|$+DqB׃TjhGrwj"FTTS&XNZ;Zk`24BBYL1kڹ{iVӤ6p 7;t725͹*c⪨HvHc2P܎P~ dqWH?O"|1v/jm͑ъ$]ޤ)i=_2eQ{^-6ρGNqtam(5=6 2GYg}c4 $-a04GONSU*6{  se,o{Ļۉݧ5)O]itrQgrv)Iib1浾 ,# 2׉kS=zC{t}EڡzY Hz[dQfg.ș=\jO^O['u$|`֡}:*P=,WQR]`|kDقgkly b7ǜ5 K("=#iey䃠cBxJm ?8 rw<2p/=f) 6:9fu<;?]xq';#0G g+JkW#>^`ovf煞ŝ|@)gGwJ9i8_ տqM?SgOP|Kxے,Z` U/>&ɼz*5 I񼰱S.. Ioū&Æ/AoPA6R½>{U02lpF46%#;털iGȐq-]4JET;J?RyU1hFÛ"1ܠ@:/ ku}.(v$~}=+H!" %oH?#-ձ $gY&8ֵ7;$ ZwP, oѫH]!Uch}N?bi=*\[31A D+'j(ِg)ih? yIg[Ğh7wL}P?7N8r&4渄,[K h v6hSoW?*Yh8'yJhG(6`?$JHk0ipO9F!:,L@|(/KJV>Pm&<1X xI=A1Y,{Lо5lF!^x~7$C+ ,.ryF7=Xn=ǑM<2NRFw"Eq/yj|#{rq\DmY+'}M ؚC6(yX서r=e E9/%*21e7ʻv E|J@ @TC!\'D`\V7UR7?Hhh ܄b1ya3 ȝ\A׵ˏQh;a;6GuO6V6Z8>g:ϣ ATU~ƭ9@ROZ:Upb&<'d#`̣둅װ-B_'i:ZRe7,Y5S#d%^\y ]^)w9OeK (̠eriAY截&a'EWnčQ($a>І~,)8R Ĩ|ݯ e \H l8]"c8Pp^,Z_J%BYvŚqSQ䠗ґnar\cjv5-QpG hOaπ o, W6 γ<PYNіs1O;޾zkbb'42odzQ?T'2H O*@xxǍR C8ȥ;ISY"Lx*}Z-q+Lh]zFRaz(Po(%Q)xᖛsqu#:^̬YX_e-f?E.ݬHNo$[S^Lp%_%¶lzHV? {+XG1t(6 *]^L|(Ȳ, xHnRUN^xNMSVh]\9/0qEcʈ,^A:7Sz4a{uU()ր\QF>#)D(FF cDx)IMV:"~].ft>BA(S w1գ$qLp1ҽz+0КEL_Dd(lQ+x0D޹z =]RH)ڌCA.돀)Kp+p-~%BO}5vVYW>8Y ?R(QֆAxk,ѐ-1^}KԆ m>ؚq, ;~wRRHm=ܡ&\v,0',{@˻fR@Yɩ띈4a]L<6e-%4™0P&nF6YѶf;(W>I@ٟ!5b$ fr~!-XVCʌLqb/wM%BrK1wpÏchV~8;Qz$KNM36;.c͸ѵD=a% Gj[;ʈ se E@yM}S?-u$>s#5)n#lj' ;xPb SvN ( 7L:{ϳ :PvY_7 ªYZ I`gȤ`A O%@pwkZE:%(ǤpnBJWBoe^ ~bo*|&IعVn#kI1[Us|]!BC_01YPMm%ת/ &ăh<̥xS.M *osH޲ewj^%lЪ㾶֞84ubJisO AxR;G G_7?pa.׸&^E aLKp 0t㥰Ŷ%@ dWkgyNYfjFϹgd/F> :Y9}o)۶Z~BJ4y@8)5rzêv1ui4xӭ}DarcK i3)oSfck:8)/x`6gDWRdHze#Oy5cl3o"4W7GyщZa#Ǘ5n4A~Փ@` UяQTlMZyuxZ䘎c!Fmxw,+ʠoFtJ U`ND\n}fu%r;t0c= 8W?]Ғ24!Uh8BVM Eէ{JhYrKYOV 0YP˫| G_d:>oK(t9l~큭W"([3ڤ| <>eJ@?!NΣ HzYy ]L~^q&[ %6-ך575OgDOVpFf[Ig4E*srV~i l۾ĕE֎ OwGe~n>7ESmżmvR;r*`̪ `0:ykQ-{J {$cm4Yl~.8'3݋d l24F't. FkO9M>IҜB&enyHHuwқ\;O(9JwF}~{Y:%k"I츋] b2F 0;(.tg^Q%=\b$ΑKsu4dCCQ .#8oqa3{|el(D m'\4鹺a{/Ϸ׻Rcݳe&$샗j#'J6)I/_ 8d$Urª5#I~ 4RנUN tC4Yqz8(_CP.~JN2Csmjx@hb7T8D84̫;}h~׵kڶ+q٘>)m @,bBBPQZb䈮 1քdAGd8upL&ywj9P`W(j ð۩PJgQ L`N,BF#ZHN4 #͘C ? nP뀺IQsþrqq(>~.ڋؘ8IBR9ud8} }C*A 2ϛ"MnnWU55uaEfUs6`ZDeTIdV?yM[Bl {: MNFO9+6(.y)O_{g$LVgMdJO\s'qHf<+&fz|>pY}(h.;FIN9EƔ.1/_H'2t@ztN!|D*0;Q!XjyܐNTeQ{H݋6+Bvꢅ̓5wBJ_@Wt\B^gjyHBF‚6><ʨ!$B$M.[|Y̋1'fukK$JfuER]^Pߤy%0'Ϝ?WMmsoyuB|([k|X)l8?wdo~ zf,X e(w8E@X8MZѸ;4E*Jl2N#%`|$0kٱ\blqKZa{T(ghK-_Xjb/;P* j_n07[==GǮ.^:qp ^ ̨<)O'34#_L%E׵Lopow-% {FiUfJqt"i ,4nia) $H˂hAdX(kl J-ˍ&ʚ8ZxL^/BN]bn7Or_5nJ#+axgFxpnx#99eDZùDqS94CɮLLwB 79vctۨ&*|WP'9eی'/S*a(*tYk`xRv_:1~'S)9wPjwaDNAUN~᐀{im[lHxyH [ 2׿U, xXiΤoB~Sq{}2ڏʑ:*ʿ*Д5\6S/ܢ >A.'/)w6݉C)_wxF l /QhFGd6c`7Bs~t9x>Cn!}ԃF N M4T RCacz&# 0Dkv"һ!~:tF1Mwشw9oA cS:T1_6ykJ3RkQ3a:2)(9ٷ"ѕkن7$z XF ĘXiݠʸT YZ