Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

selinux-policy-devel-20240930-1.1 RPM for noarch

From OpenSuSE Tumbleweed for noarch

Name: selinux-policy-devel Distribution: openSUSE Tumbleweed
Version: 20240930 Vendor: openSUSE
Release: 1.1 Build date: Mon Sep 30 09:15:18 2024
Group: System/Management Build host: reproducible
Size: 12767515 Source RPM: selinux-policy-20240930-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/fedora-selinux/selinux-policy.git
Summary: SELinux policy devel
SELinux policy development and man page package

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Mon Sep 30 2024 cathy.hu@suse.com
  - Update to version 20240930:
    * Label yast binaries correctly
* Wed Sep 25 2024 cathy.hu@suse.com
  - Update to version 20240925:
    * Allow snapperd to manage unlabeled_t files (bsc#1230966)
* Tue Sep 24 2024 cathy.hu@suse.com
  - Update to version 20240924:
    * Revert "Allow virtstoraged to manage images (bsc#1228742)"
    * Label /etc/mdevctl.d with mdevctl_conf_t
    * Sync users with Fedora targeted users
    * Update policy for rpc-virtstorage
    * Allow virtstoraged get attributes of configfs dirs
    * Fix SELinux policy for sandbox X server to fix 'sandbox -X' command
    * Update bootupd policy when ESP is not mounted
    * Allow thumb_t map dri devices
    * Allow samba use the io_uring API
    * Allow the sysadm user use the secretmem API
    * Allow nut-upsmon read systemd-logind session files
    * Allow sysadm_t to create PF_KEY sockets
    * Update bootupd policy for the removing-state-file test
* Tue Sep 24 2024 Cathy Hu <cathy.hu@suse.com>
  - Fix macros.selinux-policy (bsc#1230897)
    - %selinux_relabel_post should not relabel files in
      transactional systems in %post as the policy is not loaded
      into the kernel directly after install, instead the relabelling
      will happen on the next boot
* Thu Sep 12 2024 cathy.hu@suse.com
  - Update to version 20240912:
    * Allow systemd_ibft_rule_generator_t to create udev_rules_t dirs (bsc#1230011)
    * Allow systemd_udev_trigger_generator_t list and read sysctls (bsc#1230315)
    * Initial policy for udev-trigger-generator (bsc#1230315)
* Tue Sep 10 2024 cathy.hu@suse.com
  - Update to version 20240910:
    * Allow init_t mount syslog socket (bsc#1230134)
    * Allow init_t create syslog files (bsc#1230134)
    * Introduce initial policy for btrfs-soft-reboot-generator (bsc#1230134)
* Thu Sep 05 2024 filippo.bonazzi@suse.com
  - Update to version 20240905:
    * Allow coreos-installer-generator manage mdadm_conf_t files
    * Allow setsebool_t relabel selinux data files
    * Allow virtqemud relabelfrom virtqemud_var_run_t dirs
    * Use better escape method for "interface"
    * Allow init and systemd-logind to inherit fds from sshd
    * Allow systemd-ssh-generator read sysctl files
    * Sync modules.conf with Fedora targeted modules
    * Allow virtqemud relabel user tmp files and socket files
    * Add missing sys_chroot capability to groupadd policy
    * Label /run/libvirt/qemu/channel with virtqemud_var_run_t
    * Allow virtqemud relabelfrom also for file and sock_file
    * Add virt_create_log() and virt_write_log() interfaces
    - Sync modules-targeted-contrib.conf with Fedora targeted modules.conf
* Wed Sep 04 2024 Cathy Hu <cathy.hu@suse.com>
  - Fix macros.selinux-policy (bsc#1229132)
    - %selinux_modules_install and %selinux_modules_uninstall will
      now only execute load_policy if $TRANSACTIONAL_UPDATE is not set
      (aka only if they are not in a transactional system)
    - $TRANSACTIONAL_UPDATE is set here:
      https://github.com/openSUSE/transactional-update/blob/bd524d3ddfcd9aeebb7b90d3e0e8eed09b796a86/lib/Transaction.cpp#L428
* Tue Sep 03 2024 Johannes Segitz <jsegitz@suse.com>
  - Disable build of the MLS policy. We currently don't know if it works
    and don't want to encourage users to apply it
* Tue Sep 03 2024 cathy.hu@suse.com
  - Update to version 20240903:
    * allow sshd_t and sshd_net_t access to ssh vsockets (bsc#1228831)
* Mon Sep 02 2024 cathy.hu@suse.com
  - Update to version 20240902:
    * Allow xen to use qemu as dom0 disk backend (bsc#1228540)
    * Label /var/lib/xen/xenstore as xenstored_var_lib_t (bsc#1228540)
    * Allow xl to access hypercall interfaces to xen hypervisor (bsc#1228540)
* Fri Aug 30 2024 cathy.hu@suse.com
  - Update to version 20240830:
    * Allow virtstoraged to manage images (bsc#1228742)
    * Allow virtstoraged_t domtrans to udev (bsc#1228742)
* Wed Aug 28 2024 cathy.hu@suse.com
  - Update to version 20240828:
    * Allow systemd-ssh-generator to load net-pf-40 (bsc#1229766)
* Mon Aug 26 2024 Cathy Hu <cathy.hu@suse.com>
  - Enable named_write_master_zones boolean by default (bsc#1229479)
* Fri Aug 23 2024 cathy.hu@suse.com
  - Update to version 20240823:
    * Allow rasdaemon write access to sysfs (bsc#1229587)
* Fri Aug 16 2024 cathy.hu@suse.com
  - Update to version 20240816:
    * Initial policy for syslog-ng (bsc#1229153)
* Wed Aug 14 2024 cathy.hu@suse.com
  - Update to version 20240814:
    * Dontaudit dac_override of fstab generator (bsc#1229127)
* Wed Aug 14 2024 Cathy Hu <cathy.hu@suse.com>
  - Drop varrun-convert.sh script as it causes issues with
    container-selinux update (bsc#1228951)
* Mon Aug 12 2024 cathy.hu@suse.com
  - Update to version 20240812:
    * Update libvirt policy
    * Add port 80/udp and 443/udp to http_port_t definition
    * Additional updates stalld policy for bpf usage
    * Label systemd-pcrextend and systemd-pcrlock properly
    * Allow coreos_installer_t work with partitions
    * Revert "Allow coreos-installer-generator work with partitions"
    * Add policy for systemd-pcrextend
    * Update policy for systemd-getty-generator
    * Allow ip command write to ipsec's logs
    * Allow virt_driver_domain read virtd-lxc files in /proc
    * Revert "Allow svirt read virtqemud fifo files"
    * Update virtqemud policy for libguestfs usage
    * Allow virtproxyd create and use its private tmp files
    * Allow virtproxyd read network state
    * Allow virt_driver_domain create and use log files in /var/log
    * Allow samba-dcerpcd work with ctdb cluster
    * Allow NetworkManager_dispatcher_t send SIGKILL to plugins
    * Allow setroubleshootd execute sendmail with a domain transition
    * Allow key.dns_resolve set attributes on the kernel key ring
    * Update qatlib policy for v24.02 with new features
    * Label /var/lib/systemd/sleep with systemd_sleep_var_lib_t
    * Allow tlp status power services
    * Allow virtqemud domain transition on passt execution
    * Allow virt_driver_domain connect to systemd-userdbd over a unix socket
    * Allow boothd connect to systemd-userdbd over a unix socket
    * Update policy for awstats scripts
    * Allow bitlbee execute generic programs in system bin directories
    * Allow login_userdomain read aliases file
    * Allow login_userdomain read ipsec config files
    * Allow login_userdomain read all pid files
    * Allow rsyslog read systemd-logind session files
    * Allow libvirt-dbus stream connect to virtlxcd
* Fri Aug 09 2024 cathy.hu@suse.com
  - Update to version 20240809:
    * Label /run/udev/rules.d as udev_rules_t
    * Provide type for sysstat lock files (bsc#1228247)
    * Allow snapper to delete unlabeled_t files (bsc#1228889)
* Thu Aug 08 2024 cathy.hu@suse.com
  - Update to version 20240808:
    * Use new kanidm interfaces
    * Initial module for kanidm
    * Update bootupd policy
    * Allow rhsmcertd read/write access to /dev/papr-sysparm
    * Label /dev/papr-sysparm and /dev/papr-vpd
    * Allow abrt-dump-journal-core connect to winbindd
    * Allow systemd-hostnamed shut down nscd
    * Allow systemd-pstore send a message to syslogd over a unix domain
    * Allow postfix_domain map postfix_etc_t files
    * Allow microcode create /sys/devices/system/cpu/microcode/reload
    * Allow rhsmcertd read, write, and map ica tmpfs files
    * Support SGX devices
    * Allow initrc_t transition to passwd_t
    * Update fstab and cryptsetup generators policy
    * Allow xdm_t read and write the dma device
    * Update stalld policy for bpf usage
    * Allow systemd_gpt_generator to getattr on DOS directories
    * Make cgroup_memory_pressure_t a part of the file_type attribute
    * Allow ssh_t to change role to system_r
    * Update policy for coreos generators
    * Allow init_t nnp domain transition to firewalld_t
    * Label /run/modprobe.d with modules_conf_t
    * Allow virtnodedevd run udev with a domain transition
    * Allow virtnodedev_t create and use virtnodedev_lock_t
    * Allow virtstoraged manage files with virt_content_t type
    * Allow virtqemud unmount a filesystem with extended attributes
    * Allow svirt_t connect to unconfined_t over a unix domain socket
    * Update afterburn file transition policy
    * Allow systemd_generator read attributes of all filesystems
    * Allow fstab-generator read and write cryptsetup-generator unit file
    * Allow cryptsetup-generator read and write fstab-generator unit file
    * Allow systemd_generator map files in /etc
    * Allow systemd_generator read init's process state
    * Allow coreos-installer-generator read sssd public files
    * Allow coreos-installer-generator work with partitions
    * Label /etc/mdadm.conf.d with mdadm_conf_t
    * Confine coreos generators
    * Label /run/metadata with afterburn_runtime_t
    * Allow afterburn list ssh home directory
    * Label samba certificates with samba_cert_t
    * Label /run/coreos-installer-reboot with coreos_installer_var_run_t
    * Allow virtqemud read virt-dbus process state
    * Allow staff user dbus chat with virt-dbus
    * Allow staff use watch /run/systemd
    * Allow systemd_generator to write kmsg
    * Allow virtqemud connect to sanlock over a unix stream socket
    * Allow virtqemud relabel virt_var_run_t directories
    * Allow svirt_tcg_t read vm sysctls
    * Allow virtnodedevd connect to systemd-userdbd over a unix socket
    * Allow svirt read virtqemud fifo files
    * Allow svirt attach_queue to a virtqemud tun_socket
    * Allow virtqemud run ssh client with a transition
    * Allow virt_dbus_t connect to virtqemud_t over a unix stream socket
    * Update keyutils policy
    * Allow sshd_keygen_t connect to userdbd over a unix stream socket
    * Allow postfix-smtpd read mysql config files
    * Allow locate stream connect to systemd-userdbd
    * Allow the staff user use wireshark
    * Allow updatedb connect to userdbd over a unix stream socket
    * Allow gpg_t set attributes of public-keys.d
    * Allow gpg_t get attributes of login_userdomain stream
    * Allow systemd_getty_generator_t read /proc/1/environ
    * Allow systemd_getty_generator_t to read and write to tty_device_t
    * Drop publicfile module
    * Remove permissive domain for systemd_nsresourced_t
    * Change fs_dontaudit_write_cgroup_files() to apply to cgroup_t
    * Label /usr/bin/samba-gpupdate with samba_gpupdate_exec_t
    * Allow to create and delete socket files created by rhsm.service
    * Allow virtnetworkd exec shell when virt_hooks_unconfined is on
    * Allow unconfined_service_t transition to passwd_t
    * Support /var is empty
    * Allow abrt-dump-journal read all non_security socket files
    * Allow timemaster write to sysfs files
    * Dontaudit domain write cgroup files
    * Label /usr/lib/node_modules/npm/bin with bin_t
    * Allow ip the setexec permission
    * Allow systemd-networkd write files in /var/lib/systemd/network
    * Fix typo in systemd_nsresourced_prog_run_bpf()
* Fri Aug 02 2024 cathy.hu@suse.com
  - Update to version 20240802:
    * Dontaudit search of snapper grub plugin to nscd socket (bsc#1228745)
* Wed Jul 31 2024 cathy.hu@suse.com
  - Update to version 20240731:
    * Initial policy for ibft-rule-generator (bsc#1228402)
    * Initial policy for systemd-status-mail (bsc#1228402)
* Wed Jul 31 2024 cathy.hu@suse.com
  - Update to version 20240731:
    * Fix labels for bind/named (bsc#1228372)
* Mon Jul 29 2024 cathy.hu@suse.com
  - Update to version 20240729:
    * Label /usr/libexec/netconfig/ppp/ip-up pppd_initrc_exec_t (bsc#1228385)
    * Allow pppd to manage sysnet directories (bsc#1228385)
* Fri Jul 26 2024 cathy.hu@suse.com
  - Update to version 20240726:
    * Allow snapper grub plugin to manage unlabeled_t and read link files
* Thu Jul 25 2024 cathy.hu@suse.com
  - Update to version 20240725:
    * Initial policy for grub2 snapper plugin (bsc#1228205)
* Tue Jul 16 2024 cathy.hu@suse.com
  - Update to version 20240716:
    * Set microos autorelabel script to systemd_autorelabel_generator_t
    * Allow systemd_generator to write kmsg
    * Initial policy for systemd growpart-generator (bsc#1226824)
* Mon Jul 15 2024 cathy.hu@suse.com
  - Update to version 20240715:
    * Allow systemd_getty_generator_t read /proc/1/environ
    * Allow systemd_getty_generator_t to read and write to tty_device_t (bsc#1226888)
* Wed Jul 10 2024 cathy.hu@suse.com
  - Enable sap module
  - Add equivalency in file_contexts.subs_dist
    * /bin /usr/bin
    * /sbin /usr/bin
    * /usr/sbin /usr/bin
  - Update to version 20240710:
    * Change fc in rebootmgr module for /sbin -> /usr/bin
    * Change fc in rpm module for /sbin -> /usr/bin
    * Change fc in rsync module for /sbin -> /usr/bin
    * Change fc in wicked module for /sbin -> /usr/bin
    * Confine libvirt-dbus
    * Allow virtqemud the kill capability in user namespace
    * Allow rshim get options of the netlink class for KOBJECT_UEVENT family
    * Allow dhcpcd the kill capability
    * Allow systemd-networkd list /var/lib/systemd/network
    * Allow sysadm_t run systemd-nsresourced bpf programs
    * Update policy for systemd generators interactions
    * Allow create memory.pressure files with cgroup_memory_pressure_t
    * Add support for libvirt hooks
    * Allow certmonger read and write tpm devices
    * Allow all domains to connect to systemd-nsresourced over a unix socket
    * Allow systemd-machined read the vsock device
    * Update policy for systemd generators
    * Allow ptp4l_t request that the kernel load a kernel module
    * Allow sbd to trace processes in user namespace
    * Allow request-key execute scripts
    * Update policy for haproxyd
    * Update policy for systemd-nsresourced
    * Correct sbin-related file context entries
    * Allow login_userdomain execute systemd-tmpfiles in the caller domain
    * Allow virt_driver_domain read files labeled unconfined_t
    * Allow virt_driver_domain dbus chat with policykit
    * Allow virtqemud manage nfs files when virt_use_nfs boolean is on
    * Add rules for interactions between generators
    * Label memory.pressure files with cgroup_memory_pressure_t
    * Revert "Allow some systemd services write to cgroup files"
    * Update policy for systemd-nsresourced
    * Label /usr/bin/ntfsck with fsadm_exec_t
    * Allow systemd_fstab_generator_t read tmpfs files
    * Update policy for systemd-nsresourced
    * Alias /usr/sbin to /usr/bin and change all /usr/sbin paths to /usr/bin
    * Remove a few lines duplicated between {dkim,milter}.fc
    * Alias /bin → /usr/bin and remove redundant paths
    * Drop duplicate line for /usr/sbin/unix_chkpwd
    * Drop duplicate paths for /usr/sbin
    * Update systemd-generator policy
    * Remove permissive domain for bootupd_t
    * Remove permissive domain for coreos_installer_t
    * Remove permissive domain for afterburn_t
    * Add the sap module to modules.conf
    * Move unconfined_domain(sap_unconfined_t) to an optional block
    * Create the sap module
    * Allow systemd-coredumpd sys_admin and sys_resource capabilities
    * Allow systemd-coredump read nsfs files
    * Allow generators auto file transition only for plain files
    * Allow systemd-hwdb write to the kernel messages device
    * Escape "interface" as a file name in a virt filetrans pattern
    * Allow gnome-software work for login_userdomain
    * Allow systemd-machined manage runtime sockets
    * Revert "Allow systemd-machined manage runtime sockets"
    * Allow postfix_domain connect to postgresql over a unix socket
    * Dontaudit systemd-coredump sys_admin capability
  - Update container-selinux
* Tue Jul 02 2024 cathy.hu@suse.com
  - Update to version 20240702:
    * Allow manage dosfs_t files to snapperd (bsc#1224120)
    * Add auth_rw_wtmpdb_login_records to domains using auth_manage_login_records
    * Add auth_rw_wtmpdb_login_records to modules
    * Allow xdm_t to read-write to wtmpdb (bsc#1225984)
    * Introduce types for wtmpdb and rw interface
    * Introduce wtmp_file_type attribute
    * Revert "Add policy for wtmpdb (bsc#1210717)"
* Mon Jun 17 2024 cathy.hu@suse.com
  - Update to version 20240617:
    * Allow gnome control center to set autologin (bsc#1222978)
    * Dontaudit xdm_t to getattr on root_t (bsc#1223145)
* Thu Jun 13 2024 cathy.hu@suse.com
  - Update to version 20240613:
    * Allow systemd_fstab_generator_t read tmpfs files (bsc#1223599)
* Wed Jun 12 2024 cathy.hu@suse.com
  - Update to version 20240612:
    * Allow all domains read and write z90crypt device
    * Allow tpm2 generator setfscreate
    * Allow systemd (PID 1) manage systemd conf files
    * Allow pulseaudio map its runtime files
    * Update policy for getty-generator
    * Allow systemd-hwdb send messages to kernel unix datagram sockets
    * Allow systemd-machined manage runtime sockets
    * Allow fstab-generator create unit file symlinks
    * Update policy for cryptsetup-generator
    * Update policy for fstab-generator
    * Allow virtqemud read vm sysctls
    * Allow collectd to trace processes in user namespace
    * Allow bootupd search efivarfs dirs
    * Add policy for systemd-mountfsd
    * Add policy for systemd-nsresourced
    * Update policy generators
    * Add policy for anaconda-generator
    * Update policy for fstab and gpt generators
    * Add policy for kdump-dep-generator
    * Add policy for a generic generator
    * Add policy for tpm2 generator
    * Add policy for ssh-generator
    * Add policy for second batch of generators
    * Update policy for systemd generators
    * ci: Adjust Cockpit test plans
    * Allow journald read systemd config files and directories
    * Allow systemd_domain read systemd_conf_t dirs
    * Fix bad Python regexp escapes
    * Allow fido services connect to postgres database
    * Revert "Update the README.md file with the c10s branch information"
    * Update the README.md file with the c10s branch information
    * Allow postfix smtpd map aliases file
    * Ensure dbus communication is allowed bidirectionally
    * Label systemd configuration files with systemd_conf_t
    * Label /run/systemd/machine with systemd_machined_var_run_t
    * Allow systemd-hostnamed read the vsock device
    * Allow sysadm execute dmidecode using sudo
    * Allow sudodomain list files in /var
    * Allow setroubleshootd get attributes of all sysctls
    * Allow various services read and write z90crypt device
    * Allow nfsidmap connect to systemd-homed
    * Allow sandbox_x_client_t dbus chat with accountsd
    * Allow system_cronjob_t dbus chat with avahi_t
    * Allow staff_t the io_uring sqpoll permission
    * Allow staff_t use the io_uring API
    * Add support for secretmem anon inode
    * Allow virtqemud read vfio devices
    * Allow virtqemud get attributes of a tmpfs filesystem
    * Allow svirt_t read vm sysctls
    * Allow virtqemud create and unlink files in /etc/libvirt/
    * Allow virtqemud get attributes of cifs files
    * Allow virtqemud get attributes of filesystems with extended attributes
    * Allow virtqemud get attributes of NFS filesystems
    * Allow virt_domain read and write usb devices conditionally
    * Allow virtstoraged use the io_uring API
    * Allow virtstoraged execute lvm programs in the lvm domain
    * Allow virtnodevd_t map /var/lib files
    * Allow svirt_tcg_t map svirt_image_t files
    * Allow abrt-dump-journal-core connect to systemd-homed
    * Allow abrt-dump-journal-core connect to systemd-machined
    * Allow sssd create and use io_uring
    * Allow selinux-relabel-generator create units dir
    * Allow dbus-broker read/write inherited user ttys
    * Define transitions for /run/libvirt/common and /run/libvirt/qemu
    * Allow systemd-sleep read raw disk data
    * Allow numad to trace processes in user namespace
    * Allow abrt-dump-journal-core connect to systemd-userdbd
    * Allow plymouthd read efivarfs files
    * Update the auth_dontaudit_read_passwd_file() interface
    * Label /dev/mmcblk0rpmb character device with removable_device_t
    * fix hibernate on btrfs swapfile (F40)
    * Allow nut to statfs()
    * Allow system dbusd service status systemd services
    * Allow systemd-timedated get the timemaster service status
    * Allow keyutils-dns-resolver connect to the system log service
    * Allow qemu-ga read vm sysctls
    * postfix: allow qmgr to delete mails in bounce/ directory
* Mon Jun 03 2024 Johannes Segitz <jsegitz@suse.com>
  - Remove "Reference" from the package description. It's not the
    reference policy, but the Fedora branch of the policy
* Tue May 28 2024 Cathy Hu <cathy.hu@suse.com>
  - Use python311 tools in 15.4 and 15.5 when building selinux-policy to deprecate
    python36 tooling
* Wed May 08 2024 Johannes Segitz <jsegitz@suse.com>
  - Fixed varrun-convert.sh script to not break because of duplicate
    entries
* Mon May 06 2024 Johannes Segitz <jsegitz@suse.com>
  - Move to %posttrans to ensure selinux-policy got updated before
    the commands run (bsc#1221720)
* Mon Apr 15 2024 Cathy Hu <cathy.hu@suse.com>
  - Add file contexts "forwarding" to file_contexts.sub_dist
    to fix systemd-gpt-auto-generator and systemd-fstab-generator
    (bsc#1222736):
    * /run/systemd/generator.early /usr/lib/systemd/system
    * /run/systemd/generator.late /usr/lib/systemd/system
* Thu Apr 11 2024 cathy.hu@suse.com
  - Update to version 20240411:
    * Remove duplicate in sysnetwork.fc
    * Rename /var/run/wicked* to /run/wicked*
    * Remove /var/run/rsyslog/additional-log-sockets.conf from logging.fc
    * policy: support pidfs
    * Confine selinux-autorelabel-generator.sh
    * Allow logwatch_mail_t read/write to init over a unix stream socket
    * Allow logwatch read logind sessions files
    * files_dontaudit_getattr_tmpfs_files allowed the access and didn't dontaudit it
    * files_dontaudit_mounton_modules_object allowed the access and didn't dontaudit it
    * Allow NetworkManager the sys_ptrace capability in user namespace
    * dontaudit execmem for modemmanager
    * Allow dhcpcd use unix_stream_socket
    * Allow dhcpc read /run/netns files
    * Update mmap_rw_file_perms to include the lock permission
    * Allow plymouthd log during shutdown
    * Add logging_watch_all_log_dirs() and logging_watch_all_log_files()
    * Allow journalctl_t read filesystem sysctls
    * Allow cgred_t to get attributes of cgroup filesystems
    * Allow wdmd read hardware state information
    * Allow wdmd list the contents of the sysfs directories
    * Allow linuxptp configure phc2sys and chronyd over a unix domain socket
    * Allow sulogin relabel tty1
    * Dontaudit sulogin the checkpoint_restore capability
    * Modify sudo_role_template() to allow getpgid
    * Allow userdomain get attributes of files on an nsfs filesystem
    * Allow opafm create NFS files and directories
    * Allow virtqemud create and unlink files in /etc/libvirt/
    * Allow virtqemud domain transition on swtpm execution
    * Add the swtpm.if interface file for interactions with other domains
    * Allow samba to have dac_override capability
    * systemd: allow sys_admin capability for systemd_notify_t
    * systemd: allow systemd_notify_t to send data to kernel_t datagram sockets
    * Allow thumb_t to watch and watch_reads mount_var_run_t
    * Allow krb5kdc_t map krb5kdc_principal_t files
    * Allow unprivileged confined user dbus chat with setroubleshoot
    * Allow login_userdomain map files in /var
    * Allow wireguard work with firewall-cmd
    * Differentiate between staff and sysadm when executing crontab with sudo
    * Add crontab_admin_domtrans interface
    * Allow abrt_t nnp domain transition to abrt_handle_event_t
    * Allow xdm_t to watch and watch_reads mount_var_run_t
    * Dontaudit subscription manager setfscreate and read file contexts
    * Don't audit crontab_domain write attempts to user home
    * Transition from sudodomains to crontab_t when executing crontab_exec_t
    * Add crontab_domtrans interface
    * Fix label of pseudoterminals created from sudodomain
    * Allow utempter_t use ptmx
    * Dontaudit rpmdb attempts to connect to sssd over a unix stream socket
    * Allow admin user read/write on fixed_disk_device_t
    * Only allow confined user domains to login locally without unconfined_login
    * Add userdom_spec_domtrans_confined_admin_users interface
    * Only allow admindomain to execute shell via ssh with ssh_sysadm_login
    * Add userdom_spec_domtrans_admin_users interface
    * Move ssh dyntrans to unconfined inside unconfined_login tunable policy
    * Update ssh_role_template() for user ssh-agent type
    * Allow init to inherit system DBus file descriptors
    * Allow init to inherit fds from syslogd
    * Allow any domain to inherit fds from rpm-ostree
    * Update afterburn policy
    * Allow init_t nnp domain transition to abrtd_t
    * Rename all /var/lock file context entries to /run/lock
    * Rename all /var/run file context entries to /run
  - Add script varrun-convert.sh for locally existing modules
    to be able to cope with the /var/run -> /run change
  - Update embedded container-selinux to commit
    a8e389dbcd3f9b6ed0a7e495c6f559c0383dc49e
* Thu Mar 21 2024 jsegitz@suse.com
  - Update to version 20240321:
    * policy module for kiwi (bsc#1221109)
    * dontaudit execmem for modemmanager (bsc#1219363)
* Wed Mar 13 2024 cathy.hu@suse.com
  - Update to version 20240313:
    * Assign alts_exec_t to files_type
* Fri Mar 08 2024 cathy.hu@suse.com
  - Update to version 20240308:
    * Support /bin/alts in the policy (bsc#1217530)
    * Revert "Allow virtnetworkd_t to execute bin_t (bsc#1216903)"
* Wed Mar 06 2024 cathy.hu@suse.com
  - Update to version 20240306:
    * Replace init domtrans rule for confined users to allow exec init
    * Update dbus_role_template() to allow user service status
    * Allow polkit status all systemd services
    * Allow setroubleshootd create and use inherited io_uring
    * Allow load_policy read and write generic ptys
* Mon Mar 04 2024 cathy.hu@suse.com
  - Update to version 20240304:
    * Allow ssh-keygen to use the libica crypto module (bsc#1220373)
* Mon Feb 05 2024 cathy.hu@suse.com
  - Update to version 20240205:
    * Allow gpg manage rpm cache
    * Allow login_userdomain name_bind to howl and xmsg udp ports
    * Allow rules for confined users logged in plasma
    * Label /dev/iommu with iommu_device_t
    * Remove duplicate file context entries in /run
    * Dontaudit getty and plymouth the checkpoint_restore capability
    * Allow su domains write login records
    * Revert "Allow su domains write login records"
    * Allow login_userdomain delete session dbusd tmp socket files
    * Allow unix dgram sendto between exim processes
    * Allow su domains write login records
    * Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on
    * Allow chronyd-restricted read chronyd key files
    * Allow conntrackd_t to use bpf capability2
    * Allow systemd-networkd manage its runtime socket files
    * Allow init_t nnp domain transition to colord_t
    * Allow polkit status systemd services
    * nova: Fix duplicate declarations
    * Allow httpd work with PrivateTmp
    * Add interfaces for watching and reading ifconfig_var_run_t
    * Allow collectd read raw fixed disk device
    * Allow collectd read udev pid files
    * Set correct label on /etc/pki/pki-tomcat/kra
    * Allow systemd domains watch system dbus pid socket files
    * Allow certmonger read network sysctls
    * Allow mdadm list stratisd data directories
    * Allow syslog to run unconfined scripts conditionally
    * Allow syslogd_t nnp_transition to syslogd_unconfined_script_t
    * Allow qatlib set attributes of vfio device files
    * Allow systemd-sleep set attributes of efivarfs files
    * Allow samba-dcerpcd read public files
    * Allow spamd_update_t the sys_ptrace capability in user namespace
    * Allow bluetooth devices work with alsa
    * Allow alsa get attributes filesystems with extended attributes
    * Allow hypervkvp_t write access to NetworkManager_etc_rw_t
    * Add interface for write-only access to NetworkManager rw conf
    * Allow systemd-sleep send a message to syslog over a unix dgram socket
    * Allow init create and use netlink netfilter socket
    * Allow qatlib load kernel modules
    * Allow qatlib run lspci
    * Allow qatlib manage its private runtime socket files
    * Allow qatlib read/write vfio devices
    * Label /etc/redis.conf with redis_conf_t
    * Remove the lockdown-class rules from the policy
    * Allow init read all non-security socket files
    * Replace redundant dnsmasq pattern macros
    * Remove unneeded symlink perms in dnsmasq.if
    * Add additions to dnsmasq interface
    * Allow nvme_stas_t create and use netlink kobject uevent socket
    * Allow collectd connect to statsd port
    * Allow keepalived_t to use sys_ptrace of cap_userns
    * Allow dovecot_auth_t connect to postgresql using UNIX socket
    * Make named_zone_t and named_var_run_t a part of the mountpoint attribute
    * Allow sysadm execute traceroute in sysadm_t domain using sudo
    * Allow sysadm execute tcpdump in sysadm_t domain using sudo
    * Allow opafm search nfs directories
    * Add support for syslogd unconfined scripts
    * Allow gpsd use /dev/gnss devices
    * Allow gpg read rpm cache
    * Allow virtqemud additional permissions
    * Allow virtqemud manage its private lock files
    * Allow virtqemud use the io_uring api
    * Allow ddclient send e-mail notifications
    * Allow postfix_master_t map postfix data files
    * Allow init create and use vsock sockets
    * Allow thumb_t append to init unix domain stream sockets
    * Label /dev/vas with vas_device_t
    * Create interface selinux_watch_config and add it to SELinux users
    * Update cifs interfaces to include fs_search_auto_mountpoints()
    * Allow sudodomain read var auth files
    * Allow spamd_update_t read hardware state information
    * Allow virtnetworkd domain transition on tc command execution
    * Allow sendmail MTA connect to sendmail LDA
    * Allow auditd read all domains process state
    * Allow rsync read network sysctls
    * Add dhcpcd bpf capability to run bpf programs
    * Dontaudit systemd-hwdb dac_override capability
    * Allow systemd-sleep create efivarfs files
    * Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on
    * Allow graphical applications work in Wayland
    * Allow kdump work with PrivateTmp
    * Allow dovecot-auth work with PrivateTmp
    * Allow nfsd get attributes of all filesystems
    * Allow unconfined_domain_type use io_uring cmd on domain
    * ci: Only run Rawhide revdeps tests on the rawhide branch
    * Label /var/run/auditd.state as auditd_var_run_t
    * Allow fido-device-onboard (FDO) read the crack database
    * Allow ip an explicit domain transition to other domains
    * Label /usr/libexec/selinux/selinux-autorelabel with semanage_exec_t
    * Allow  winbind_rpcd_t processes access when samba_export_all_* is on
    * Enable NetworkManager and dhclient to use initramfs-configured DHCP connection
    * Allow ntp to bind and connect to ntske port.
* Tue Jan 16 2024 cathy.hu@suse.com
  - Update to version 20240116:
    * Fix gitolite homedir paths (bsc#1218826)
* Tue Jan 09 2024 cathy.hu@suse.com
  - Update to version 20240104:
    * Allow keepalived_t read+write kernel_t pipes (bsc#1216060)
    * allow rebootmgr to read the system state (bsc#1205931)
* Tue Nov 28 2023 Hu <cathy.hu@suse.com>
  - Trigger rebuild of the policy when pcre2 gets updated to avoid
    regex version mismatch errors (bsc#1216747).
* Fri Nov 24 2023 cathy.hu@suse.com
  - Update to version 20231124:
    * Allow virtnetworkd_t to execute bin_t (bsc#1216903)
* Wed Nov 22 2023 Hu <cathy.hu@suse.com>
  - Add new modules that were missed in the last update to
    modules-mls-contrib.conf
* Wed Nov 22 2023 Hu <cathy.hu@suse.com>
  - Add new modules that were missed in the last update to
    modules-targeted-contrib.conf
* Mon Oct 30 2023 cathy.hu@suse.com
  - Update to version 20231030:
    * Allow system_mail_t manage exim spool files and dirs
    * Dontaudit keepalived setattr on keepalived_unconfined_script_exec_t
    * Label /run/pcsd.socket with cluster_var_run_t
    * ci: Run cockpit tests in PRs
    * Add map_read map_write to kernel_prog_run_bpf
    * Allow systemd-fstab-generator read all symlinks
    * Allow systemd-fstab-generator the dac_override capability
    * Allow rpcbind read network sysctls
    * Support using systemd containers
    * Allow sysadm_t to connect to iscsid using a unix domain stream socket
    * Add policy for coreos installer
    * Add policy for nvme-stas
    * Confine systemd fstab,sysv,rc-local
    * Label /etc/aliases.lmdb with etc_aliases_t
    * Create policy for afterburn
    * Make new virt drivers permissive
    * Split virt policy, introduce virt_supplementary module
    * Allow apcupsd cgi scripts read /sys
    * Allow kernel_t to manage and relabel all files
    * Add missing optional_policy() to files_relabel_all_files()
    * Allow named and ndc use the io_uring api
    * Deprecate common_anon_inode_perms usage
    * Improve default file context(None) of /var/lib/authselect/backups
    * Allow udev_t to search all directories with a filesystem type
    * Implement proper anon_inode support
    * Allow targetd write to the syslog pid sock_file
    * Add ipa_pki_retrieve_key_exec() interface
    * Allow kdumpctl_t to list all directories with a filesystem type
    * Allow udev additional permissions
    * Allow udev load kernel module
    * Allow sysadm_t to mmap modules_object_t files
    * Add the unconfined_read_files() and unconfined_list_dirs() interfaces
    * Set default file context of HOME_DIR/tmp/.* to <<none>>
    * Allow kernel_generic_helper_t to execute mount(1)
    * Allow sssd send SIGKILL to passkey_child running in ipa_otpd_t
    * Allow systemd-localed create Xserver config dirs
    * Allow sssd read symlinks in /etc/sssd
    * Label /dev/gnss[0-9] with gnss_device_t
    * Allow systemd-sleep read/write efivarfs variables
    * ci: Fix version number of packit generated srpms
    * Dontaudit rhsmcertd write memory device
    * Allow ssh_agent_type create a sockfile in /run/user/USERID
    * Set default file context of /var/lib/authselect/backups to <<none>>
    * Allow prosody read network sysctls
    * Allow cupsd_t to use bpf capability
    * Allow sssd domain transition on passkey_child execution conditionally
    * Allow login_userdomain watch lnk_files in /usr
    * Allow login_userdomain watch video4linux devices
    * Change systemd-network-generator transition to include class file
    * Revert "Change file transition for systemd-network-generator"
    * Allow nm-dispatcher winbind plugin read/write samba var files
    * Allow systemd-networkd write to cgroup files
    * Allow kdump create and use its memfd: objects
    * Allow fedora-third-party get generic filesystem attributes
    * Allow sssd use usb devices conditionally
    * Update policy for qatlib
    * Allow ssh_agent_type manage generic cache home files
    * Change file transition for systemd-network-generator
    * Additional support for gnome-initial-setup
    * Update gnome-initial-setup policy for geoclue
    * Allow openconnect vpn open vhost net device
    * Allow cifs.upcall to connect to SSSD also through the /var/run socket
    * Grant cifs.upcall more required capabilities
    * Allow xenstored map xenfs files
    * Update policy for fdo
    * Allow keepalived watch var_run dirs
    * Allow svirt to rw /dev/udmabuf
    * Allow qatlib  to modify hardware state information.
    * Allow key.dns_resolve connect to avahi over a unix stream socket
    * Allow key.dns_resolve create and use unix datagram socket
    * Use quay.io as the container image source for CI
    * ci: Move srpm/rpm build to packit
    * .copr: Avoid subshell and changing directory
    * Allow gpsd, oddjob and oddjob_mkhomedir_t write user_tty_device_t chr_file
    * Label /usr/libexec/openssh/ssh-pkcs11-helper with ssh_agent_exec_t
    * Make insights_client_t an unconfined domain
    * Allow insights-client manage user temporary files
    * Allow insights-client create all rpm logs with a correct label
    * Allow insights-client manage generic logs
    * Allow cloud_init create dhclient var files and init_t manage net_conf_t
    * Allow insights-client read and write cluster tmpfs files
    * Allow ipsec read nsfs files
    * Make tuned work with mls policy
    * Remove nsplugin_role from mozilla.if
    * allow mon_procd_t self:cap_userns sys_ptrace
    * Allow pdns name_bind and name_connect all ports
    * Set the MLS range of fsdaemon_t to s0 - mls_systemhigh
    * ci: Move to actions/checkout@v3 version
    * .copr: Replace chown call with standard workflow safe.directory setting
    * .copr: Enable `set -u` for robustness
    * .copr: Simplify root directory variable
    * Allow rhsmcertd dbus chat with policykit
    * Allow polkitd execute pkla-check-authorization with nnp transition
    * Allow user_u and staff_u get attributes of non-security dirs
    * Allow unconfined user filetrans chrome_sandbox_home_t
    * Allow svnserve execute postdrop with a transition
    * Do not make postfix_postdrop_t type an MTA executable file
    * Allow samba-dcerpc service manage samba tmp files
    * Add use_nfs_home_dirs boolean for mozilla_plugin
    * Fix labeling for no-stub-resolv.conf
    * Revert "Allow winbind-rpcd use its private tmp files"
    * Allow upsmon execute upsmon via a helper script
    * Allow openconnect vpn read/write inherited vhost net device
    * Allow winbind-rpcd use its private tmp files
    * Update samba-dcerpc policy for printing
    * Allow gpsd,oddjob,oddjob_mkhomedir rw user domain pty
    * Allow nscd watch system db dirs
    * Allow qatlib to read sssd public files
    * Allow fedora-third-party read /sys and proc
    * Allow systemd-gpt-generator mount a tmpfs filesystem
    * Allow journald write to cgroup files
    * Allow rpc.mountd read network sysctls
    * Allow blueman read the contents of the sysfs filesystem
    * Allow logrotate_t to map generic files in /etc
    * Boolean: Allow virt_qemu_ga create ssh directory
    * Allow systemd-network-generator send system log messages
    * Dontaudit the execute permission on sock_file globally
    * Allow fsadm_t the file mounton permission
    * Allow named and ndc the io_uring sqpoll permission
    * Allow sssd io_uring sqpoll permission
    * Fix location for /run/nsd
    * Allow qemu-ga get fixed disk devices attributes
    * Update bitlbee policy
    * Label /usr/sbin/sos with sosreport_exec_t
    * Update policy for the sblim-sfcb service
    * Add the files_getattr_non_auth_dirs() interface
    * Fix the CI to work with DNF5
    * Make systemd_tmpfiles_t MLS trusted for lowering the level of files
    * Revert "Allow insights client map cache_home_t"
    * Allow nfsidmapd connect to systemd-machined over a unix socket
    * Allow snapperd connect to kernel over a unix domain stream socket
    * Allow virt_qemu_ga_t create .ssh dir with correct label
    * Allow targetd read network sysctls
    * Set the abrt_handle_event boolean to on
    * Permit kernel_t to change the user identity in object contexts
    * Allow insights client map cache_home_t
    * Label /usr/sbin/mariadbd with mysqld_exec_t
    * Allow httpd tcp connect to redis port conditionally
    * Label only /usr/sbin/ripd and ripngd with zebra_exec_t
    * Dontaudit aide the execmem permission
    * Remove permissive from fdo
    * Allow sa-update manage spamc home files
    * Allow sa-update connect to systemlog services
    * Label /usr/lib/systemd/system/mimedefang.service with antivirus_unit_file_t
    * Allow nsd_crond_t write nsd_var_run_t & connectto nsd_t
    * Allow bootupd search EFI directory
    * Change init_audit_control default value to true
    * Allow nfsidmapd connect to systemd-userdbd with a unix socket
    * Add the qatlib  module
    * Add the fdo module
    * Add the bootupd module
    * Set default ports for keylime policy
    * Create policy for qatlib
    * Add policy for FIDO Device Onboard
    * Add policy for bootupd
    * Add support for kafs-dns requested by keyutils
    * Allow insights-client execmem
    * Add support for chronyd-restricted
    * Add init_explicit_domain() interface
    * Allow fsadm_t to get attributes of cgroup filesystems
    * Add list_dir_perms to kerberos_read_keytab
    * Label /var/run/tmpfiles.d/static-nodes.conf with kmod_var_run_t
    * Allow sendmail manage its runtime files
* Thu Oct 12 2023 cathy.hu@suse.com
  - Update to version 20231012:
    * Allow sssd_t watch permission to net_conf_t dirs (bsc#1216052)
    * Revert fix for bsc#1205770 since it causes a regression for bsc#1214887
* Wed Oct 04 2023 Johannes Segitz <jsegitz@suse.com>
  - Use /var/adm/update-scripts in macros.selinux-policy. The rpm state
    directory doesn't exist on SUSE systems (bsc#1213593)
* Tue Sep 19 2023 Johannes Segitz <jsegitz@suse.com>
  - Modified update.sh to require first parameter "full" to also
    update container-selinux. For maintenance updates you usually
    don't want it to be updated
* Fri Jul 28 2023 filippo.bonazzi@suse.com
  - Update to version 20230728:
    * Allow kdump_t to manage symlinks under kdump_var_lib_t (bsc#1213721)
    * allow haveged to manage tmpfs directories (bsc#1213594)
* Thu Jun 22 2023 jsegitz@suse.com
  - Update to version 20230622:
    * Allow keyutils_dns_resolver_exec_t be an entrypoint
    * Allow collectd_t read network state symlinks
    * Revert "Allow collectd_t read proc_net link files"
    * Allow nfsd_t to list exports_t dirs
    * Allow cupsd dbus chat with xdm
    * Allow haproxy read hardware state information
    * Label /dev/userfaultfd with userfaultfd_t
    * Allow blueman send general signals to unprivileged user domains
    * Allow dkim-milter domain transition to sendmail
* Tue Apr 25 2023 cathy.hu@suse.com
  - Update to version 20230425:
    * Remove unneeded manage_dirs_pattern for lastlog_t (bsc#1210461)
    * Add policy for wtmpdb (bsc#1210717)
* Tue Apr 25 2023 cathy.hu@suse.com
  - Update to version 20230425:
    * Add support for lastlog2 (bsc#1210461)
    * allow the chrony client to use unallocated ttys (bsc#1210672)
* Thu Apr 20 2023 jsegitz@suse.com
  - Update to version 20230420:
    * libzypp creates temporary files in /var/adm/mount. Label it with
      rpm_var_cache_t to prevent wrong labels in /var/cache/zypp
    * only use rsync_exec_t for the rsync server, not for the client
      (bsc#1209890)
    * properly label sshd-gen-keys-start to ensure ssh host keys have proper
      labels after creation
    * Allow dovecot-deliver write to the main process runtime fifo files
    * Allow dmidecode write to cloud-init tmp files
    * Allow chronyd send a message to cloud-init over a datagram socket
    * Allow cloud-init domain transition to insights-client domain
    * Allow mongodb read filesystem sysctls
    * Allow mongodb read network sysctls
    * Allow accounts-daemon read generic systemd unit lnk files
    * Allow blueman watch generic device dirs
    * Allow nm-dispatcher tlp plugin create tlp dirs
    * Allow systemd-coredump mounton /usr
    * Allow rabbitmq to read network sysctls
    * Allow certmonger dbus chat with the cron system domain
    * Allow geoclue read network sysctls
    * Allow geoclue watch the /etc directory
    * Allow logwatch_mail_t read network sysctls
    * allow systemd_resolved_t to bind to all nodes (bsc#1200182)
    * Allow insights-client read all sysctls
    * Allow passt manage qemu pid sock files
    * Allow sssd read accountsd fifo files
    * Add support for the passt_t domain
    * Allow virtd_t and svirt_t work with passt
    * Add new interfaces in the virt module
    * Add passt interfaces defined conditionally
    * Allow tshark the setsched capability
    * Allow poweroff create connections to system dbus
    * Allow wg load kernel modules, search debugfs dir
    * Boolean: allow qemu-ga manage ssh home directory
    * Label smtpd with sendmail_exec_t
    * Label msmtp and msmtpd with sendmail_exec_t
    * Allow dovecot to map files in /var/spool/dovecot
    * Confine gnome-initial-setup
    * Allow qemu-guest-agent create and use vsock socket
    * Allow login_pgm setcap permission
    * Allow chronyc read network sysctls
    * Enhancement of the /usr/sbin/request-key helper policy
    * Fix opencryptoki file names in /dev/shm
    * Allow system_cronjob_t transition to rpm_script_t
    * Revert "Allow system_cronjob_t domtrans to rpm_script_t"
    * Add tunable to allow squid bind snmp port
    * Allow staff_t getattr init pid chr & blk files and read krb5
    * Allow firewalld to rw z90crypt device
    * Allow httpd work with tokens in /dev/shm
    * Allow svirt to map svirt_image_t char files
    * Allow sysadm_t run initrc_t script and sysadm_r role access
    * Allow insights-client manage fsadm pid files
    * Allowing snapper to create snapshots of /home/ subvolume/partition
    * Add boolean qemu-ga to run unconfined script
    * Label systemd-journald feature LogNamespace
    * Add none file context for polyinstantiated tmp dirs
    * Allow certmonger read the contents of the sysfs filesystem
    * Add journalctl the sys_resource capability
    * Allow nm-dispatcher plugins read generic files in /proc
* Tue Mar 28 2023 Hu <cathy.hu@suse.com>
  - Add debug-build.sh script to make debugging without committing easier
* Tue Mar 21 2023 jsegitz@suse.com
  - Update to version 20230321:
    * make kernel_t unconfined again
* Thu Mar 16 2023 jsegitz@suse.com
  - Update to version 20230316:
    * prevent labeling of overlayfs filesystems based on the /var/lib/overlay
      path
    * allow kernel_t to relabel etc_t files
    * allow kernel_t to relabel sysnet config files
    * allow kernel_t to relabel systemd hwdb etc files
    * add systemd_hwdb_relabel_etc_files to allow labeling of hwdb files
    * change sysnet_relabelto_net_conf and sysnet_relabelfrom_net_conf to apply
      to files and lnk_files. lnk_files are commonly used in SUSE to allow easy
      management of config files
    * add files_relabel_etc_files_basic and files_relabel_etc_lnk_files_basic
      interfaces to allow labeling on etc_t, not on the broader configfiles
      attribute
    * Allow systemd-timesyncd to bind to generic UDP ports (bsc#1207962). The
      watch permissions reported are already fixed in a current policy.
  - Reinstate update.sh and remove container-selinux from the service.
    Having both repos in there causes issues and update.sh makes the update
    process easier in general. Updated README.Update
* Tue Mar 07 2023 Johannes Segitz <jsegitz@suse.com>
  - Remove erroneous SUSE man page. Will not be created with the
    3.5 toolchain
* Tue Feb 14 2023 Hu <cathy.hu@suse.com>
  - Complete packaging rework: Move policy to git repository and
    only use tar_scm obs service to refresh from there:
    https://gitlab.suse.de/selinux/selinux-policy
    Please use `osc service manualrun` to update this OBS package to the
    newest git version.
    * Added README.Update describing how to update this package
    * Added _service file that pulls from selinux-policy and
      upstream container-selinux and tars them
    * Adapted selinux-policy.spec to build selinux-policy with
      container-selinux
    * Removed update.sh as no longer needed
    * Removed suse specific modules as they are now covered by git commits
    * packagekit.te packagekit.if packagekit.fc
    * rebootmgr.te rebootmgr.if rebootmgr.fc
    * rtorrent.te rtorrent.if rtorrent.fc
    * wicked.te wicked.if wicked.fc
    * Removed *.patch as they are now covered by git commits:
    * distro_suse_to_distro_redhat.patch
    * dontaudit_interface_kmod_tmpfs.patch
    * fix_accountsd.patch
    * fix_alsa.patch
    * fix_apache.patch
    * fix_auditd.patch
    * fix_authlogin.patch
    * fix_automount.patch
    * fix_bitlbee.patch
    * fix_chronyd.patch
    * fix_cloudform.patch
    * fix_colord.patch
    * fix_corecommand.patch
    * fix_cron.patch
    * fix_dbus.patch
    * fix_djbdns.patch
    * fix_dnsmasq.patch
    * fix_dovecot.patch
    * fix_entropyd.patch
    * fix_firewalld.patch
    * fix_fwupd.patch
    * fix_geoclue.patch
    * fix_hypervkvp.patch
    * fix_init.patch
    * fix_ipsec.patch
    * fix_iptables.patch
    * fix_irqbalance.patch
    * fix_java.patch
    * fix_kernel.patch
    * fix_kernel_sysctl.patch
    * fix_libraries.patch
    * fix_locallogin.patch
    * fix_logging.patch
    * fix_logrotate.patch
    * fix_mcelog.patch
    * fix_miscfiles.patch
    * fix_nagios.patch
    * fix_networkmanager.patch
    * fix_nis.patch
    * fix_nscd.patch
    * fix_ntp.patch
    * fix_openvpn.patch
    * fix_postfix.patch
    * fix_rpm.patch
    * fix_rtkit.patch
    * fix_screen.patch
    * fix_selinuxutil.patch
    * fix_sendmail.patch
    * fix_smartmon.patch
    * fix_snapper.patch
    * fix_sslh.patch
    * fix_sysnetwork.patch
    * fix_systemd.patch
    * fix_systemd_watch.patch
    * fix_thunderbird.patch
    * fix_unconfined.patch
    * fix_unconfineduser.patch
    * fix_unprivuser.patch
    * fix_userdomain.patch
    * fix_usermanage.patch
    * fix_wine.patch
    * fix_xserver.patch
    * sedoctool.patch
    * systemd_domain_dyntrans_type.patch
* Mon Feb 06 2023 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20230206. Refreshed:
    * fix_entropyd.patch
    * fix_networkmanager.patch
    * fix_systemd_watch.patch
    * fix_unconfineduser.patch
  - Updated fix_kernel.patch to allow kernel_t access to xdm state. This is
    necessary as plymouth doesn't run in it's own domain in early boot
* Mon Jan 16 2023 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20230125. Refreshed:
    * distro_suse_to_distro_redhat.patch
    * fix_dnsmasq.patch
    * fix_init.patch
    * fix_ipsec.patch
    * fix_kernel_sysctl.patch
    * fix_logging.patch
    * fix_rpm.patch
    * fix_selinuxutil.patch
    * fix_systemd_watch.patch
    * fix_userdomain.patch
  - More flexible lib(exec) matching in fix_fwupd.patch
  - Removed sys_admin for systemd_gpt_generator_t in fix_systemd.patch
  - Dropped fix_container.patch, is now upstream
  - Added fix_entropyd.patch
    * Added new interface entropyd_semaphore_filetrans to properly transfer
      semaphore created during early boot. That doesn't work yet, so work
      around with next item
    * Allow reading tempfs files
  - Added fix_kernel.patch. Added modutils_execute_kmod_tmpfs_files interace
    to allow kmod_tmpfs_t files to be executed. Necessary for firewalld
  - Added fix_rtkit.patch to fix labeling of binary
  - Modified fix_ntp.patch:
    * Proper labeling for start-ntpd
    * Fixed label rules for chroot path
    * Temporarily allow dac_override for ntpd_t (bsc#1207577)
    * Add interface ntp_manage_pid_files to allow management of pid
      files
  - Updated fix_networkmanager.patch to allow managing ntp pid files
* Thu Jan 12 2023 Johannes Segitz <jsegitz@suse.com>
  - Update fix_container.patch to allow privileged containers to use
    localectl (bsc#1207077)
* Wed Jan 11 2023 Johannes Segitz <jsegitz@suse.com>
  - Add fix_container.patch to allow privileged containers to use
    timedatectl (bsc#1207054)
* Thu Dec 15 2022 Hu <cathy.hu@suse.com>
  - Added fix_ipsec.patch: Allow AF_ALG socket creation for strongswan
    (bnc#1206445)
* Wed Dec 14 2022 Hu <cathy.hu@suse.com>
  - Added policy for wicked scripts under /etc/sysconfig/network/scripts
    (bnc#1205770)
* Wed Dec 14 2022 Johannes Segitz <jsegitz@suse.com>
  - Add fix_sendmail.patch
    * fix context of custom sendmail startup helper
    * fix context of /var/run/sendmail and add necessary rules to manage
      content in there
* Tue Dec 13 2022 Johannes Segitz <jsegitz@suse.com>
  - Updated fix_networkmanager.patch to fixe labeling of nm-dispatcher and
    nm-priv-helper until the packaging is adjusted (bsc#1206355)
  - Update fix_chronyd.patch to allow  sendto towards
    NetworkManager_dispatcher_custom_t. Added new interface
    networkmanager_dispatcher_custom_dgram_send for this (bsc#1206357)
  - Update fix_dbus.patch to allow dbus to watch lib directories (bsc#1205895)
* Tue Dec 06 2022 Johannes Segitz <jsegitz@suse.com>
  - Updated fix_networkmanager.patch to allow NetworkManager to watch
    net_conf_t (bsc#1206109)
* Wed Nov 30 2022 Filippo Bonazzi <filippo.bonazzi@suse.com>
  - Add fix_irqbalance.patch: support netlink socket operations (bsc#1205434)
* Wed Nov 30 2022 Filippo Bonazzi <filippo.bonazzi@suse.com>
  - Drop fix_irqbalance.patch: superseded by upstream
* Thu Nov 24 2022 Hu <cathy.hu@suse.com>
  - fix_sysnetwork.patch: firewalld uses /etc/sysconfig/network/ for
    network interface definition instead of /etc/sysconfig/network-scripts/,
    modified sysnetwork.fc to reflect that (bsc#1205580).
* Wed Oct 19 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20221019. Refreshed:
    * distro_suse_to_distro_redhat.patch
    * fix_apache.patch
    * fix_chronyd.patch
    * fix_cron.patch
    * fix_init.patch
    * fix_kernel_sysctl.patch
    * fix_networkmanager.patch
    * fix_rpm.patch
    * fix_sysnetwork.patch
    * fix_systemd.patch
    * fix_systemd_watch.patch
    * fix_unconfined.patch
    * fix_unconfineduser.patch
    * fix_unprivuser.patch
    * fix_xserver.patch
  - Dropped fix_cockpit.patch as this is now packaged with cockpit itself
  - Remove the ipa module, freeip ships their own module
  - Added fix_alsa.patch to allow reading of config files in home directories
  - Extended fix_networkmanager.patch and fix_postfix.patch to account
    for SUSE systems
  - Added dontaudit_interface_kmod_tmpfs.patch to prevent AVCs when startproc
    queries the running processes
  - Updated fix_snapper.patch to allow snapper to talk to rpm via dbus
* Fri Sep 30 2022 Johannes Segitz <jsegitz@suse.com>
  - Updated quilt couldn't unpack tarball. This will cause ongoing issues
    so drop the sed statement in the %prep section and add
    distro_suse_to_distro_redhat.patch to add the necessary changes
    via a patch
* Thu Sep 29 2022 Johannes Segitz <jsegitz@suse.com>
  - Update fix_networkmanager.patch to ensure NetworkManager chrony
    dispatcher is properly labled and update fix_chronyd.patch to ensure
    chrony helper script has proper label to be used by NetworkManager.
    Also allow NetworkManager_dispatcher_custom_t to query systemd status
    (bsc#1203824)
* Tue Sep 27 2022 Filippo Bonazzi <filippo.bonazzi@suse.com>
  - Update fix_xserver.patch to add greetd support (bsc#1198559)
* Mon Sep 12 2022 Johannes Segitz <jsegitz@suse.com>
  - Revamped rtorrent module
* Fri Aug 26 2022 Thorsten Kukuk <kukuk@suse.com>
  - Move SUSE directory from manual page section to html docu
* Wed Jul 27 2022 Hu <cathy.hu@suse.com>
  - fix_networkmanager.patch: Allow NetworkManager_dispatcher_tlp_t
    and NetworkManager_dispatcher_custom_t to access nscd socket
    (bsc#1201741)
* Tue Jul 26 2022 Zdenek Kubala <zkubala@suse.com>
  - Add fix_cloudform.patch to fix cloud-init runcmd issue with snapper
    (bnc#1201015)
* Thu Jul 14 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20220714. Refreshed:
    * fix_init.patch
    * fix_systemd_watch.patch
* Wed Jul 13 2022 Johannes Segitz <jsegitz@suse.com>
  - Update fix_systemd.patch to add cap sys_admin and kernel_dgram_send for
    systemd_gpt_generator_t (bsc#1200911)
* Mon Jul 11 2022 Johannes Segitz <jsegitz@suse.com>
  - postfix: Label PID files and some helpers correctly (bsc#1197242)
* Fri Jun 24 2022 Johannes Segitz <jsegitz@suse.com>
  - Add fix_userdomain.patch to dontaudit UDP rpc ports (bsc#1193984)
* Fri Jun 24 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20220624. Refreshed:
    * fix_init.patch
    * fix_kernel_sysctl.patch
    * fix_logging.patch
    * fix_networkmanager.patch
    * fix_unprivuser.patch
    Dropped fix_hadoop.patch, not necessary anymore
    * Updated fix_locallogin.patch to allow accesses for nss-systemd
    (bsc#1199630)
* Fri May 20 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20220520 to pass stricter 3.4 toolchain checks
* Fri May 20 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20220428. Refreshed:
    * fix_apache.patch
    * fix_hadoop.patch
    * fix_init.patch
    * fix_iptables.patch
    * fix_kernel_sysctl.patch
    * fix_networkmanager.patch
    * fix_systemd.patch
    * fix_systemd_watch.patch
    * fix_unprivuser.patch
    * fix_usermanage.patch
    * fix_wine.patch
* Thu May 19 2022 Johannes Segitz <jsegitz@suse.com>
  - Add fix_dnsmasq.patch to fix problems with virtualization on Microos
    (bsc#1199518)
* Tue May 03 2022 Johannes Segitz <jsegitz@suse.com>
  - Modified fix_init.patch to allow init to setup contrained environment
    for accountsservice. This needs a better, more general solution
    (bsc#1197610)
* Mon May 02 2022 Johannes Segitz <jsegitz@suse.com>
  - Add systemd_domain_dyntrans_type.patch to allow systemd to dyntransition.
    This happens in certain boot conditions (bsc#1182500)
  - Changed fix_unconfineduser.patch to not transition into ldconfig_t
    from unconfined_t (bsc#1197169)
* Thu Feb 17 2022 Klaus Kämpf <kkaempf@suse.com>
  - use %license tag for COPYING file
* Thu Feb 10 2022 Johannes Segitz <jsegitz@suse.com>
  - Updated fix_cron.patch. Adjust labeling for at (bsc#1195683)
* Wed Feb 09 2022 Filippo Bonazzi <filippo.bonazzi@suse.com>
  - Fix bitlbee runtime directory (bsc#1193230)
    * add fix_bitlbee.patch
* Mon Jan 24 2022 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20220124. Refreshed:
    * fix_hadoop.patch
    * fix_init.patch
    * fix_kernel_sysctl.patch
    * fix_systemd.patch
    * fix_systemd_watch.patch
  - Added fix_hypervkvp.patch to fix issues with hyperv labeling
    (bsc#1193987)
* Fri Jan 14 2022 Johannes Segitz <jsegitz@suse.com>
  - Allow colord to use systemd hardenings (bsc#1194631)
* Thu Nov 11 2021 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20211111. Refreshed:
    * fix_dbus.patch
    * fix_systemd.patch
    * fix_authlogin.patch
    * fix_auditd.patch
    * fix_kernel_sysctl.patch
    * fix_networkmanager.patch
    * fix_chronyd.patch
    * fix_unconfineduser.patch
    * fix_unconfined.patch
    * fix_firewalld.patch
    * fix_init.patch
    * fix_xserver.patch
    * fix_logging.patch
    * fix_hadoop.patch
* Mon Oct 25 2021 Marcus Meissner <meissner@suse.com>
  - fix_wine.patch: give Wine .dll same context as .so (bsc#1191976)
* Tue Sep 28 2021 Enzo Matsumiya <ematsumiya@suse.com>
  - Fix auditd service start with systemd hardening directives (boo#1190918)
    * add fix_auditd.patch
* Thu Sep 02 2021 Johannes Segitz <jsegitz@suse.com>
  - Modified fix_systemd.patch to allow systemd gpt generator access to
    udev files (bsc#1189280)
* Fri Aug 27 2021 Ales Kedroutek <ales.kedroutek@suse.com>
  - fix rebootmgr does not trigger the reboot properly (boo#1189878)
    * fix managing /etc/rebootmgr.conf
    * allow rebootmgr_t to cope with systemd and dbus messaging
* Thu Aug 26 2021 Johannes Segitz <jsegitz@suse.com>
  - Properly label cockpit files
  - Allow wicked to communicate with network manager on DBUS (bsc#1188331)
* Mon Aug 23 2021 Ales Kedroutek <ales.kedroutek@suse.com>
  - Added policy module for rebootmgr (jsc#SMO-28)
* Tue Aug 17 2021 Ludwig Nussel <lnussel@suse.de>
  - Allow systemd-sysctl to read kernel specific sysctl.conf
    (fix_kernel_sysctl.patch, boo#1184804)
* Tue Aug 10 2021 Ludwig Nussel <lnussel@suse.de>
  - Fix quoting in postInstall macro
* Fri Jul 16 2021 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20210716
  - Remove interfaces for container module before building the package
    (bsc#1188184)
  - Updated
    * fix_init.patch
    * fix_systemd_watch.patch
    to adapt to upstream changes
* Thu Jul 15 2021 Callum Farmer <gmbr3@opensuse.org>
  - Use tabrmd SELinux modules from tpm2.0-abrmd instead of storing
    here
* Tue Jul 06 2021 Alberto Planas Dominguez <aplanas@suse.com>
  - Add tabrmd SELinux modules from upstream (bsc#1187925)
    https://github.com/tpm2-software/tpm2-abrmd/tree/master/selinux
  - Automatic spec-cleaner to fix ordering and misaligned spaces
* Mon Jun 28 2021 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20210419
  - Dropped fix_gift.patch, module was removed
  - Updated wicked.te to removed dropped interface
  - Refreshed:
    * fix_cockpit.patch
    * fix_hadoop.patch
    * fix_init.patch
    * fix_logging.patch
    * fix_logrotate.patch
    * fix_networkmanager.patch
    * fix_nscd.patch
    * fix_rpm.patch
    * fix_selinuxutil.patch
    * fix_systemd.patch
    * fix_systemd_watch.patch
    * fix_thunderbird.patch
    * fix_unconfined.patch
    * fix_unconfineduser.patch
    * fix_unprivuser.patch
    * fix_xserver.patch
* Tue May 18 2021 Ludwig Nussel <lnussel@suse.de>
  - allow systemd to watch /usr, /usr/lib, /etc, /etc/pki as we have path units
    that trigger on changes in those.
    Added fix_systemd_watch.patch
  - own /usr/share/selinux/packages/$SELINUXTYPE/ and
    /var/lib/selinux/$SELINUXTYPE/active/modules/* to allow packages to install
    files there
* Wed Apr 28 2021 Ludwig Nussel <lnussel@suse.de>
  - allow cockpit socket to bind nodes (fix_cockpit.patch)
  - use %autosetup to get rid of endless patch lines
* Tue Apr 27 2021 Johannes Segitz <jsegitz@suse.com>
  - Updated fix_networkmanager.patch to allow NetworkManager to watch
    its configuration directories
  - Added fix_dovecot.patch to fix dovecot authentication (bsc#1182207)
* Mon Apr 26 2021 Johannes Segitz <jsegitz@suse.com>
  - Added Recommends for selinux-autorelabel (bsc#1181837)
  - Prevent libreoffice fonts from changing types on every relabel
    (bsc#1185265). Added fix_libraries.patch
* Fri Apr 23 2021 Johannes Segitz <jsegitz@suse.com>
  - Transition unconfined users to ldconfig type (bsc#1183121).
    Extended fix_unconfineduser.patch
* Mon Apr 19 2021 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20210419
  - Refreshed:
    * fix_dbus.patch
    * fix_hadoop.patch
    * fix_init.patch
    * fix_unprivuser.patch
* Fri Mar 12 2021 Ales Kedroutek <ales.kedroutek@suse.com>
  - Adjust fix_init.patch to allow systemd to do sd-listen on
    tcp socket [bsc#1183177]
* Tue Mar 09 2021 Johannes Segitz <jsegitz@suse.com>
  - Update to version 20210309
  - Refreshed
    * fix_systemd.patch
    * fix_selinuxutil.patch
    * fix_iptables.patch
    * fix_init.patch
    * fix_logging.patch
    * fix_nscd.patch
    * fix_hadoop.patch
    * fix_unconfineduser.patch
    * fix_chronyd.patch
    * fix_networkmanager.patch
    * fix_cron.patch
    * fix_usermanage.patch
    * fix_unprivuser.patch
    * fix_rpm.patch
  - Ensure that /usr/etc is labeled according to /etc rules
* Tue Feb 23 2021 Thorsten Kukuk <kukuk@suse.com>
  - Update to version 20210223
  - Change name of tar file to a more common schema to allow
    parallel installation of several source versions
  - Adjust fix_init.patch
* Mon Jan 11 2021 Thorsten Kukuk <kukuk@suse.com>
  - Update to version 20210111
    - Drop fix_policykit.patch (integrated upstream)
    - Adjust fix_iptables.patch
    - update container policy

Files

/usr/share/man/man8/NetworkManager_dispatcher_chronyc_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_cloud_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_console_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_custom_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_ddclient_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_dhclient_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_dnssec_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_iscsid_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_sendmail_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_tlp_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_winbind_selinux.8.gz
/usr/share/man/man8/NetworkManager_priv_helper_selinux.8.gz
/usr/share/man/man8/NetworkManager_selinux.8.gz
/usr/share/man/man8/NetworkManager_ssh_selinux.8.gz
/usr/share/man/man8/_selinux.8.gz
/usr/share/man/man8/abrt_dump_oops_selinux.8.gz
/usr/share/man/man8/abrt_handle_event_selinux.8.gz
/usr/share/man/man8/abrt_helper_selinux.8.gz
/usr/share/man/man8/abrt_retrace_coredump_selinux.8.gz
/usr/share/man/man8/abrt_retrace_worker_selinux.8.gz
/usr/share/man/man8/abrt_selinux.8.gz
/usr/share/man/man8/abrt_upload_watch_selinux.8.gz
/usr/share/man/man8/abrt_watch_log_selinux.8.gz
/usr/share/man/man8/accountsd_selinux.8.gz
/usr/share/man/man8/acct_selinux.8.gz
/usr/share/man/man8/admin_crontab_selinux.8.gz
/usr/share/man/man8/afs_bosserver_selinux.8.gz
/usr/share/man/man8/afs_fsserver_selinux.8.gz
/usr/share/man/man8/afs_kaserver_selinux.8.gz
/usr/share/man/man8/afs_ptserver_selinux.8.gz
/usr/share/man/man8/afs_selinux.8.gz
/usr/share/man/man8/afs_vlserver_selinux.8.gz
/usr/share/man/man8/afterburn_selinux.8.gz
/usr/share/man/man8/aiccu_selinux.8.gz
/usr/share/man/man8/aide_selinux.8.gz
/usr/share/man/man8/aisexec_selinux.8.gz
/usr/share/man/man8/alsa_selinux.8.gz
/usr/share/man/man8/amanda_recover_selinux.8.gz
/usr/share/man/man8/amanda_selinux.8.gz
/usr/share/man/man8/amavis_selinux.8.gz
/usr/share/man/man8/amtu_selinux.8.gz
/usr/share/man/man8/anaconda_generator_selinux.8.gz
/usr/share/man/man8/anaconda_selinux.8.gz
/usr/share/man/man8/anon_sftpd_selinux.8.gz
/usr/share/man/man8/antivirus_selinux.8.gz
/usr/share/man/man8/apache_selinux.8.gz
/usr/share/man/man8/apcupsd_cgi_script_selinux.8.gz
/usr/share/man/man8/apcupsd_selinux.8.gz
/usr/share/man/man8/apm_selinux.8.gz
/usr/share/man/man8/apmd_selinux.8.gz
/usr/share/man/man8/arpwatch_selinux.8.gz
/usr/share/man/man8/asterisk_selinux.8.gz
/usr/share/man/man8/audisp_remote_selinux.8.gz
/usr/share/man/man8/audisp_selinux.8.gz
/usr/share/man/man8/auditadm_screen_selinux.8.gz
/usr/share/man/man8/auditadm_selinux.8.gz
/usr/share/man/man8/auditadm_su_selinux.8.gz
/usr/share/man/man8/auditadm_sudo_selinux.8.gz
/usr/share/man/man8/auditctl_selinux.8.gz
/usr/share/man/man8/auditd_selinux.8.gz
/usr/share/man/man8/automount_selinux.8.gz
/usr/share/man/man8/avahi_selinux.8.gz
/usr/share/man/man8/awstats_script_selinux.8.gz
/usr/share/man/man8/awstats_selinux.8.gz
/usr/share/man/man8/bacula_admin_selinux.8.gz
/usr/share/man/man8/bacula_selinux.8.gz
/usr/share/man/man8/bacula_unconfined_script_selinux.8.gz
/usr/share/man/man8/bcfg2_selinux.8.gz
/usr/share/man/man8/bind_selinux.8.gz
/usr/share/man/man8/bitlbee_selinux.8.gz
/usr/share/man/man8/blkmapd_selinux.8.gz
/usr/share/man/man8/blktap_selinux.8.gz
/usr/share/man/man8/blueman_selinux.8.gz
/usr/share/man/man8/bluetooth_helper_selinux.8.gz
/usr/share/man/man8/bluetooth_selinux.8.gz
/usr/share/man/man8/boinc_project_selinux.8.gz
/usr/share/man/man8/boinc_selinux.8.gz
/usr/share/man/man8/boltd_selinux.8.gz
/usr/share/man/man8/boothd_selinux.8.gz
/usr/share/man/man8/bootloader_selinux.8.gz
/usr/share/man/man8/bootupd_selinux.8.gz
/usr/share/man/man8/brctl_selinux.8.gz
/usr/share/man/man8/brltty_selinux.8.gz
/usr/share/man/man8/bugzilla_script_selinux.8.gz
/usr/share/man/man8/cachefiles_kernel_selinux.8.gz
/usr/share/man/man8/cachefilesd_selinux.8.gz
/usr/share/man/man8/calamaris_selinux.8.gz
/usr/share/man/man8/callweaver_selinux.8.gz
/usr/share/man/man8/canna_selinux.8.gz
/usr/share/man/man8/cardmgr_selinux.8.gz
/usr/share/man/man8/ccs_selinux.8.gz
/usr/share/man/man8/cdcc_selinux.8.gz
/usr/share/man/man8/cdrecord_selinux.8.gz
/usr/share/man/man8/certmaster_selinux.8.gz
/usr/share/man/man8/certmonger_selinux.8.gz
/usr/share/man/man8/certmonger_unconfined_selinux.8.gz
/usr/share/man/man8/certwatch_selinux.8.gz
/usr/share/man/man8/cfengine_execd_selinux.8.gz
/usr/share/man/man8/cfengine_monitord_selinux.8.gz
/usr/share/man/man8/cfengine_serverd_selinux.8.gz
/usr/share/man/man8/cgclear_selinux.8.gz
/usr/share/man/man8/cgconfig_selinux.8.gz
/usr/share/man/man8/cgred_selinux.8.gz
/usr/share/man/man8/checkpc_selinux.8.gz
/usr/share/man/man8/checkpolicy_selinux.8.gz
/usr/share/man/man8/chfn_selinux.8.gz
/usr/share/man/man8/chkpwd_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_nacl_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_selinux.8.gz
/usr/share/man/man8/chronyc_selinux.8.gz
/usr/share/man/man8/chronyd_restricted_selinux.8.gz
/usr/share/man/man8/chronyd_selinux.8.gz
/usr/share/man/man8/chroot_user_selinux.8.gz
/usr/share/man/man8/cifs_helper_selinux.8.gz
/usr/share/man/man8/cinder_api_selinux.8.gz
/usr/share/man/man8/cinder_backup_selinux.8.gz
/usr/share/man/man8/cinder_scheduler_selinux.8.gz
/usr/share/man/man8/cinder_volume_selinux.8.gz
/usr/share/man/man8/ciped_selinux.8.gz
/usr/share/man/man8/clamd_selinux.8.gz
/usr/share/man/man8/clamscan_selinux.8.gz
/usr/share/man/man8/clogd_selinux.8.gz
/usr/share/man/man8/cloud_init_selinux.8.gz
/usr/share/man/man8/cluster_selinux.8.gz
/usr/share/man/man8/clvmd_selinux.8.gz
/usr/share/man/man8/cmirrord_selinux.8.gz
/usr/share/man/man8/cobblerd_selinux.8.gz
/usr/share/man/man8/collectd_script_selinux.8.gz
/usr/share/man/man8/collectd_selinux.8.gz
/usr/share/man/man8/colord_selinux.8.gz
/usr/share/man/man8/comsat_selinux.8.gz
/usr/share/man/man8/condor_collector_selinux.8.gz
/usr/share/man/man8/condor_master_selinux.8.gz
/usr/share/man/man8/condor_negotiator_selinux.8.gz
/usr/share/man/man8/condor_procd_selinux.8.gz
/usr/share/man/man8/condor_schedd_selinux.8.gz
/usr/share/man/man8/condor_startd_selinux.8.gz
/usr/share/man/man8/condor_startd_ssh_selinux.8.gz
/usr/share/man/man8/conman_selinux.8.gz
/usr/share/man/man8/conman_unconfined_script_selinux.8.gz
/usr/share/man/man8/conntrackd_selinux.8.gz
/usr/share/man/man8/consolekit_selinux.8.gz
/usr/share/man/man8/coreos_boot_mount_generator_selinux.8.gz
/usr/share/man/man8/coreos_installer_generator_selinux.8.gz
/usr/share/man/man8/coreos_installer_selinux.8.gz
/usr/share/man/man8/coreos_liveiso_autologin_generator_selinux.8.gz
/usr/share/man/man8/coreos_sulogin_force_generator_selinux.8.gz
/usr/share/man/man8/corosync_selinux.8.gz
/usr/share/man/man8/couchdb_selinux.8.gz
/usr/share/man/man8/courier_authdaemon_selinux.8.gz
/usr/share/man/man8/courier_pcp_selinux.8.gz
/usr/share/man/man8/courier_pop_selinux.8.gz
/usr/share/man/man8/courier_sqwebmail_selinux.8.gz
/usr/share/man/man8/courier_tcpd_selinux.8.gz
/usr/share/man/man8/cpucontrol_selinux.8.gz
/usr/share/man/man8/cpufreqselector_selinux.8.gz
/usr/share/man/man8/cpuplug_selinux.8.gz
/usr/share/man/man8/cpuspeed_selinux.8.gz
/usr/share/man/man8/crack_selinux.8.gz
/usr/share/man/man8/crond_selinux.8.gz
/usr/share/man/man8/cronjob_selinux.8.gz
/usr/share/man/man8/crontab_selinux.8.gz
/usr/share/man/man8/ctdbd_selinux.8.gz
/usr/share/man/man8/cups_brf_selinux.8.gz
/usr/share/man/man8/cups_pdf_selinux.8.gz
/usr/share/man/man8/cupsd_config_selinux.8.gz
/usr/share/man/man8/cupsd_lpd_selinux.8.gz
/usr/share/man/man8/cupsd_selinux.8.gz
/usr/share/man/man8/cvs_script_selinux.8.gz
/usr/share/man/man8/cvs_selinux.8.gz
/usr/share/man/man8/cyphesis_selinux.8.gz
/usr/share/man/man8/cyrus_selinux.8.gz
/usr/share/man/man8/dbadm_selinux.8.gz
/usr/share/man/man8/dbadm_sudo_selinux.8.gz
/usr/share/man/man8/dbskkd_selinux.8.gz
/usr/share/man/man8/dcc_client_selinux.8.gz
/usr/share/man/man8/dcc_dbclean_selinux.8.gz
/usr/share/man/man8/dccd_selinux.8.gz
/usr/share/man/man8/dccifd_selinux.8.gz
/usr/share/man/man8/dccm_selinux.8.gz
/usr/share/man/man8/dcerpcd_selinux.8.gz
/usr/share/man/man8/ddclient_selinux.8.gz
/usr/share/man/man8/deltacloudd_selinux.8.gz
/usr/share/man/man8/denyhosts_selinux.8.gz
/usr/share/man/man8/devicekit_disk_selinux.8.gz
/usr/share/man/man8/devicekit_power_selinux.8.gz
/usr/share/man/man8/devicekit_selinux.8.gz
/usr/share/man/man8/dhcpc_selinux.8.gz
/usr/share/man/man8/dhcpd_selinux.8.gz
/usr/share/man/man8/dictd_selinux.8.gz
/usr/share/man/man8/dirsrv_selinux.8.gz
/usr/share/man/man8/dirsrv_snmp_selinux.8.gz
/usr/share/man/man8/disk_munin_plugin_selinux.8.gz
/usr/share/man/man8/dkim_milter_selinux.8.gz
/usr/share/man/man8/dlm_controld_selinux.8.gz
/usr/share/man/man8/dmesg_selinux.8.gz
/usr/share/man/man8/dmidecode_selinux.8.gz
/usr/share/man/man8/dnsmasq_selinux.8.gz
/usr/share/man/man8/dnssec_trigger_selinux.8.gz
/usr/share/man/man8/dovecot_auth_selinux.8.gz
/usr/share/man/man8/dovecot_deliver_selinux.8.gz
/usr/share/man/man8/dovecot_selinux.8.gz
/usr/share/man/man8/drbd_selinux.8.gz
/usr/share/man/man8/dspam_script_selinux.8.gz
/usr/share/man/man8/dspam_selinux.8.gz
/usr/share/man/man8/entropyd_selinux.8.gz
/usr/share/man/man8/eventlogd_selinux.8.gz
/usr/share/man/man8/evtchnd_selinux.8.gz
/usr/share/man/man8/exim_selinux.8.gz
/usr/share/man/man8/fail2ban_client_selinux.8.gz
/usr/share/man/man8/fail2ban_selinux.8.gz
/usr/share/man/man8/fcoemon_selinux.8.gz
/usr/share/man/man8/fdo_selinux.8.gz
/usr/share/man/man8/fdo_ssh_selinux.8.gz
/usr/share/man/man8/fedoratp_selinux.8.gz
/usr/share/man/man8/fenced_selinux.8.gz
/usr/share/man/man8/fetchmail_selinux.8.gz
/usr/share/man/man8/fingerd_selinux.8.gz
/usr/share/man/man8/firewalld_selinux.8.gz
/usr/share/man/man8/firewallgui_selinux.8.gz
/usr/share/man/man8/firstboot_selinux.8.gz
/usr/share/man/man8/foghorn_selinux.8.gz
/usr/share/man/man8/fprintd_selinux.8.gz
/usr/share/man/man8/freeipmi_bmc_watchdog_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmidetectd_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmiseld_selinux.8.gz
/usr/share/man/man8/freqset_selinux.8.gz
/usr/share/man/man8/freshclam_selinux.8.gz
/usr/share/man/man8/fsadm_selinux.8.gz
/usr/share/man/man8/fsdaemon_selinux.8.gz
/usr/share/man/man8/ftpd_selinux.8.gz
/usr/share/man/man8/ftpdctl_selinux.8.gz
/usr/share/man/man8/fwupd_selinux.8.gz
/usr/share/man/man8/games_selinux.8.gz
/usr/share/man/man8/games_srv_selinux.8.gz
/usr/share/man/man8/gconfd_selinux.8.gz
/usr/share/man/man8/gconfdefaultsm_selinux.8.gz
/usr/share/man/man8/gdomap_selinux.8.gz
/usr/share/man/man8/geoclue_selinux.8.gz
/usr/share/man/man8/getty_selinux.8.gz
/usr/share/man/man8/gfs_controld_selinux.8.gz
/usr/share/man/man8/git_script_selinux.8.gz
/usr/share/man/man8/git_session_selinux.8.gz
/usr/share/man/man8/git_system_selinux.8.gz
/usr/share/man/man8/gitosis_selinux.8.gz
/usr/share/man/man8/glance_api_selinux.8.gz
/usr/share/man/man8/glance_registry_selinux.8.gz
/usr/share/man/man8/glance_scrubber_selinux.8.gz
/usr/share/man/man8/glusterd_selinux.8.gz
/usr/share/man/man8/gnome_atspi_selinux.8.gz
/usr/share/man/man8/gnome_initial_setup_selinux.8.gz
/usr/share/man/man8/gnomesystemmm_selinux.8.gz
/usr/share/man/man8/gpg_agent_selinux.8.gz
/usr/share/man/man8/gpg_helper_selinux.8.gz
/usr/share/man/man8/gpg_pinentry_selinux.8.gz
/usr/share/man/man8/gpg_selinux.8.gz
/usr/share/man/man8/gpg_web_selinux.8.gz
/usr/share/man/man8/gpm_selinux.8.gz
/usr/share/man/man8/gpsd_selinux.8.gz
/usr/share/man/man8/greylist_milter_selinux.8.gz
/usr/share/man/man8/groupadd_selinux.8.gz
/usr/share/man/man8/groupd_selinux.8.gz
/usr/share/man/man8/gssd_selinux.8.gz
/usr/share/man/man8/gssproxy_selinux.8.gz
/usr/share/man/man8/guest_selinux.8.gz
/usr/share/man/man8/haproxy_selinux.8.gz
/usr/share/man/man8/hddtemp_selinux.8.gz
/usr/share/man/man8/hostapd_selinux.8.gz
/usr/share/man/man8/hostname_selinux.8.gz
/usr/share/man/man8/hsqldb_selinux.8.gz
/usr/share/man/man8/httpd_helper_selinux.8.gz
/usr/share/man/man8/httpd_passwd_selinux.8.gz
/usr/share/man/man8/httpd_php_selinux.8.gz
/usr/share/man/man8/httpd_rotatelogs_selinux.8.gz
/usr/share/man/man8/httpd_selinux.8.gz
/usr/share/man/man8/httpd_suexec_selinux.8.gz
/usr/share/man/man8/httpd_sys_script_selinux.8.gz
/usr/share/man/man8/httpd_unconfined_script_selinux.8.gz
/usr/share/man/man8/httpd_user_script_selinux.8.gz
/usr/share/man/man8/hwclock_selinux.8.gz
/usr/share/man/man8/hwloc_dhwd_selinux.8.gz
/usr/share/man/man8/hypervkvp_selinux.8.gz
/usr/share/man/man8/hypervvssd_selinux.8.gz
/usr/share/man/man8/ibacm_selinux.8.gz
/usr/share/man/man8/iceauth_selinux.8.gz
/usr/share/man/man8/icecast_selinux.8.gz
/usr/share/man/man8/ifconfig_selinux.8.gz
/usr/share/man/man8/inetd_child_selinux.8.gz
/usr/share/man/man8/inetd_selinux.8.gz
/usr/share/man/man8/init_selinux.8.gz
/usr/share/man/man8/initrc_selinux.8.gz
/usr/share/man/man8/innd_selinux.8.gz
/usr/share/man/man8/insights_client_selinux.8.gz
/usr/share/man/man8/install_selinux.8.gz
/usr/share/man/man8/iodined_selinux.8.gz
/usr/share/man/man8/iotop_selinux.8.gz
/usr/share/man/man8/ipmievd_helper_selinux.8.gz
/usr/share/man/man8/ipmievd_selinux.8.gz
/usr/share/man/man8/ipsec_mgmt_selinux.8.gz
/usr/share/man/man8/ipsec_selinux.8.gz
/usr/share/man/man8/iptables_selinux.8.gz
/usr/share/man/man8/irc_selinux.8.gz
/usr/share/man/man8/irqbalance_selinux.8.gz
/usr/share/man/man8/irssi_selinux.8.gz
/usr/share/man/man8/iscsid_selinux.8.gz
/usr/share/man/man8/isnsd_selinux.8.gz
/usr/share/man/man8/iwhd_selinux.8.gz
/usr/share/man/man8/jabberd_router_selinux.8.gz
/usr/share/man/man8/jabberd_selinux.8.gz
/usr/share/man/man8/jetty_selinux.8.gz
/usr/share/man/man8/jockey_selinux.8.gz
/usr/share/man/man8/journalctl_selinux.8.gz
/usr/share/man/man8/kadmind_selinux.8.gz
/usr/share/man/man8/kafs_selinux.8.gz
/usr/share/man/man8/kanidm_sshkeys_direct_selinux.8.gz
/usr/share/man/man8/kanidm_sshkeys_selinux.8.gz
/usr/share/man/man8/kanidm_unixd_selinux.8.gz
/usr/share/man/man8/kanidm_unixd_tasks_selinux.8.gz
/usr/share/man/man8/kdump_dep_generator_selinux.8.gz
/usr/share/man/man8/kdump_selinux.8.gz
/usr/share/man/man8/kdumpctl_selinux.8.gz
/usr/share/man/man8/kdumpgui_selinux.8.gz
/usr/share/man/man8/keepalived_selinux.8.gz
/usr/share/man/man8/keepalived_unconfined_script_selinux.8.gz
/usr/share/man/man8/kernel_generic_helper_selinux.8.gz
/usr/share/man/man8/kernel_selinux.8.gz
/usr/share/man/man8/kernel_systemctl_selinux.8.gz
/usr/share/man/man8/keyboardd_selinux.8.gz
/usr/share/man/man8/keystone_cgi_script_selinux.8.gz
/usr/share/man/man8/keystone_selinux.8.gz
/usr/share/man/man8/keyutils_dns_resolver_selinux.8.gz
/usr/share/man/man8/keyutils_request_selinux.8.gz
/usr/share/man/man8/kismet_selinux.8.gz
/usr/share/man/man8/kiwi_selinux.8.gz
/usr/share/man/man8/klogd_selinux.8.gz
/usr/share/man/man8/kmod_selinux.8.gz
/usr/share/man/man8/kpatch_selinux.8.gz
/usr/share/man/man8/kpropd_selinux.8.gz
/usr/share/man/man8/krb5kdc_selinux.8.gz
/usr/share/man/man8/ksm_selinux.8.gz
/usr/share/man/man8/ksmtuned_selinux.8.gz
/usr/share/man/man8/ktalkd_selinux.8.gz
/usr/share/man/man8/l2tpd_selinux.8.gz
/usr/share/man/man8/ldconfig_selinux.8.gz
/usr/share/man/man8/libvirt_selinux.8.gz
/usr/share/man/man8/lircd_selinux.8.gz
/usr/share/man/man8/livecd_selinux.8.gz
/usr/share/man/man8/lldpad_selinux.8.gz
/usr/share/man/man8/load_policy_selinux.8.gz
/usr/share/man/man8/loadkeys_selinux.8.gz
/usr/share/man/man8/local_login_selinux.8.gz
/usr/share/man/man8/locate_selinux.8.gz
/usr/share/man/man8/lockdev_selinux.8.gz
/usr/share/man/man8/logadm_selinux.8.gz
/usr/share/man/man8/logrotate_mail_selinux.8.gz
/usr/share/man/man8/logrotate_selinux.8.gz
/usr/share/man/man8/logwatch_mail_selinux.8.gz
/usr/share/man/man8/logwatch_selinux.8.gz
/usr/share/man/man8/lpd_selinux.8.gz
/usr/share/man/man8/lpr_selinux.8.gz
/usr/share/man/man8/lsassd_selinux.8.gz
/usr/share/man/man8/lsmd_plugin_selinux.8.gz
/usr/share/man/man8/lsmd_selinux.8.gz
/usr/share/man/man8/lttng_sessiond_selinux.8.gz
/usr/share/man/man8/lvm_selinux.8.gz
/usr/share/man/man8/lwiod_selinux.8.gz
/usr/share/man/man8/lwregd_selinux.8.gz
/usr/share/man/man8/lwsmd_selinux.8.gz
/usr/share/man/man8/mail_munin_plugin_selinux.8.gz
/usr/share/man/man8/mailman_cgi_selinux.8.gz
/usr/share/man/man8/mailman_mail_selinux.8.gz
/usr/share/man/man8/mailman_queue_selinux.8.gz
/usr/share/man/man8/man2html_script_selinux.8.gz
/usr/share/man/man8/mandb_selinux.8.gz
/usr/share/man/man8/mcelog_selinux.8.gz
/usr/share/man/man8/mdadm_selinux.8.gz
/usr/share/man/man8/mediawiki_script_selinux.8.gz
/usr/share/man/man8/memcached_selinux.8.gz
/usr/share/man/man8/mencoder_selinux.8.gz
/usr/share/man/man8/minidlna_selinux.8.gz
/usr/share/man/man8/minissdpd_selinux.8.gz
/usr/share/man/man8/mock_build_selinux.8.gz
/usr/share/man/man8/mock_selinux.8.gz
/usr/share/man/man8/modemmanager_selinux.8.gz
/usr/share/man/man8/mojomojo_script_selinux.8.gz
/usr/share/man/man8/mon_procd_selinux.8.gz
/usr/share/man/man8/mon_statd_selinux.8.gz
/usr/share/man/man8/mongod_selinux.8.gz
/usr/share/man/man8/motion_selinux.8.gz
/usr/share/man/man8/mount_ecryptfs_selinux.8.gz
/usr/share/man/man8/mount_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_config_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_selinux.8.gz
/usr/share/man/man8/mozilla_selinux.8.gz
/usr/share/man/man8/mpd_selinux.8.gz
/usr/share/man/man8/mplayer_selinux.8.gz
/usr/share/man/man8/mptcpd_selinux.8.gz
/usr/share/man/man8/mrtg_selinux.8.gz
/usr/share/man/man8/mscan_selinux.8.gz
/usr/share/man/man8/munin_script_selinux.8.gz
/usr/share/man/man8/munin_selinux.8.gz
/usr/share/man/man8/mysqld_safe_selinux.8.gz
/usr/share/man/man8/mysqld_selinux.8.gz
/usr/share/man/man8/mysqlmanagerd_selinux.8.gz
/usr/share/man/man8/mythtv_script_selinux.8.gz
/usr/share/man/man8/nagios_admin_plugin_selinux.8.gz
/usr/share/man/man8/nagios_checkdisk_plugin_selinux.8.gz
/usr/share/man/man8/nagios_eventhandler_plugin_selinux.8.gz
/usr/share/man/man8/nagios_mail_plugin_selinux.8.gz
/usr/share/man/man8/nagios_openshift_plugin_selinux.8.gz
/usr/share/man/man8/nagios_script_selinux.8.gz
/usr/share/man/man8/nagios_selinux.8.gz
/usr/share/man/man8/nagios_services_plugin_selinux.8.gz
/usr/share/man/man8/nagios_system_plugin_selinux.8.gz
/usr/share/man/man8/nagios_unconfined_plugin_selinux.8.gz
/usr/share/man/man8/named_selinux.8.gz
/usr/share/man/man8/namespace_init_selinux.8.gz
/usr/share/man/man8/ncftool_selinux.8.gz
/usr/share/man/man8/ndc_selinux.8.gz
/usr/share/man/man8/netlabel_mgmt_selinux.8.gz
/usr/share/man/man8/netlogond_selinux.8.gz
/usr/share/man/man8/netutils_selinux.8.gz
/usr/share/man/man8/neutron_selinux.8.gz
/usr/share/man/man8/newrole_selinux.8.gz
/usr/share/man/man8/nfsd_selinux.8.gz
/usr/share/man/man8/nfsidmap_selinux.8.gz
/usr/share/man/man8/ninfod_selinux.8.gz
/usr/share/man/man8/nmbd_selinux.8.gz
/usr/share/man/man8/nova_selinux.8.gz
/usr/share/man/man8/nrpe_selinux.8.gz
/usr/share/man/man8/nscd_selinux.8.gz
/usr/share/man/man8/nsd_crond_selinux.8.gz
/usr/share/man/man8/nsd_selinux.8.gz
/usr/share/man/man8/nslcd_selinux.8.gz
/usr/share/man/man8/ntop_selinux.8.gz
/usr/share/man/man8/ntpd_selinux.8.gz
/usr/share/man/man8/numad_selinux.8.gz
/usr/share/man/man8/nut_upsd_selinux.8.gz
/usr/share/man/man8/nut_upsdrvctl_selinux.8.gz
/usr/share/man/man8/nut_upsmon_selinux.8.gz
/usr/share/man/man8/nutups_cgi_script_selinux.8.gz
/usr/share/man/man8/nvme_stas_selinux.8.gz
/usr/share/man/man8/nx_server_selinux.8.gz
/usr/share/man/man8/nx_server_ssh_selinux.8.gz
/usr/share/man/man8/obex_selinux.8.gz
/usr/share/man/man8/oddjob_mkhomedir_selinux.8.gz
/usr/share/man/man8/oddjob_selinux.8.gz
/usr/share/man/man8/opafm_selinux.8.gz
/usr/share/man/man8/openct_selinux.8.gz
/usr/share/man/man8/opendnssec_selinux.8.gz
/usr/share/man/man8/openfortivpn_selinux.8.gz
/usr/share/man/man8/openhpid_selinux.8.gz
/usr/share/man/man8/openshift_app_selinux.8.gz
/usr/share/man/man8/openshift_cgroup_read_selinux.8.gz
/usr/share/man/man8/openshift_cron_selinux.8.gz
/usr/share/man/man8/openshift_initrc_selinux.8.gz
/usr/share/man/man8/openshift_net_read_selinux.8.gz
/usr/share/man/man8/openshift_script_selinux.8.gz
/usr/share/man/man8/openshift_selinux.8.gz
/usr/share/man/man8/opensm_selinux.8.gz
/usr/share/man/man8/openvpn_selinux.8.gz
/usr/share/man/man8/openvpn_unconfined_script_selinux.8.gz
/usr/share/man/man8/openvswitch_selinux.8.gz
/usr/share/man/man8/openwsman_selinux.8.gz
/usr/share/man/man8/oracleasm_selinux.8.gz
/usr/share/man/man8/osad_selinux.8.gz
/usr/share/man/man8/pacemaker_selinux.8.gz
/usr/share/man/man8/packagekit_selinux.8.gz
/usr/share/man/man8/pads_selinux.8.gz
/usr/share/man/man8/pam_console_selinux.8.gz
/usr/share/man/man8/pam_timestamp_selinux.8.gz
/usr/share/man/man8/passenger_selinux.8.gz
/usr/share/man/man8/passwd_selinux.8.gz
/usr/share/man/man8/pcp_plugin_selinux.8.gz
/usr/share/man/man8/pcp_pmcd_selinux.8.gz
/usr/share/man/man8/pcp_pmie_selinux.8.gz
/usr/share/man/man8/pcp_pmlogger_selinux.8.gz
/usr/share/man/man8/pcp_pmproxy_selinux.8.gz
/usr/share/man/man8/pcscd_selinux.8.gz
/usr/share/man/man8/pdns_control_selinux.8.gz
/usr/share/man/man8/pdns_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_account_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_admin_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_logicalfile_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_services_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_storage_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_system_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_unconfined_selinux.8.gz
/usr/share/man/man8/pegasus_selinux.8.gz
/usr/share/man/man8/pesign_selinux.8.gz
/usr/share/man/man8/phc2sys_selinux.8.gz
/usr/share/man/man8/ping_selinux.8.gz
/usr/share/man/man8/pingd_selinux.8.gz
/usr/share/man/man8/pkcs_slotd_selinux.8.gz
/usr/share/man/man8/pki_ra_selinux.8.gz
/usr/share/man/man8/pki_tomcat_script_selinux.8.gz
/usr/share/man/man8/pki_tomcat_selinux.8.gz
/usr/share/man/man8/pki_tps_selinux.8.gz
/usr/share/man/man8/plymouth_selinux.8.gz
/usr/share/man/man8/plymouthd_selinux.8.gz
/usr/share/man/man8/podsleuth_selinux.8.gz
/usr/share/man/man8/policykit_auth_selinux.8.gz
/usr/share/man/man8/policykit_grant_selinux.8.gz
/usr/share/man/man8/policykit_resolve_selinux.8.gz
/usr/share/man/man8/policykit_selinux.8.gz
/usr/share/man/man8/polipo_selinux.8.gz
/usr/share/man/man8/polipo_session_selinux.8.gz
/usr/share/man/man8/portmap_helper_selinux.8.gz
/usr/share/man/man8/portmap_selinux.8.gz
/usr/share/man/man8/portreserve_selinux.8.gz
/usr/share/man/man8/postfix_bounce_selinux.8.gz
/usr/share/man/man8/postfix_cleanup_selinux.8.gz
/usr/share/man/man8/postfix_local_selinux.8.gz
/usr/share/man/man8/postfix_map_selinux.8.gz
/usr/share/man/man8/postfix_master_selinux.8.gz
/usr/share/man/man8/postfix_pickup_selinux.8.gz
/usr/share/man/man8/postfix_pipe_selinux.8.gz
/usr/share/man/man8/postfix_postdrop_selinux.8.gz
/usr/share/man/man8/postfix_postqueue_selinux.8.gz
/usr/share/man/man8/postfix_qmgr_selinux.8.gz
/usr/share/man/man8/postfix_showq_selinux.8.gz
/usr/share/man/man8/postfix_smtp_selinux.8.gz
/usr/share/man/man8/postfix_smtpd_selinux.8.gz
/usr/share/man/man8/postfix_virtual_selinux.8.gz
/usr/share/man/man8/postgresql_selinux.8.gz
/usr/share/man/man8/postgrey_selinux.8.gz
/usr/share/man/man8/pppd_selinux.8.gz
/usr/share/man/man8/pptp_selinux.8.gz
/usr/share/man/man8/prelink_cron_system_selinux.8.gz
/usr/share/man/man8/prelink_selinux.8.gz
/usr/share/man/man8/prelude_audisp_selinux.8.gz
/usr/share/man/man8/prelude_correlator_selinux.8.gz
/usr/share/man/man8/prelude_lml_selinux.8.gz
/usr/share/man/man8/prelude_selinux.8.gz
/usr/share/man/man8/preupgrade_selinux.8.gz
/usr/share/man/man8/prewikka_script_selinux.8.gz
/usr/share/man/man8/privoxy_selinux.8.gz
/usr/share/man/man8/procmail_selinux.8.gz
/usr/share/man/man8/prosody_selinux.8.gz
/usr/share/man/man8/psad_selinux.8.gz
/usr/share/man/man8/ptal_selinux.8.gz
/usr/share/man/man8/ptchown_selinux.8.gz
/usr/share/man/man8/ptp4l_selinux.8.gz
/usr/share/man/man8/pulseaudio_selinux.8.gz
/usr/share/man/man8/puppetagent_selinux.8.gz
/usr/share/man/man8/puppetca_selinux.8.gz
/usr/share/man/man8/puppetmaster_selinux.8.gz
/usr/share/man/man8/pwauth_selinux.8.gz
/usr/share/man/man8/pyicqt_selinux.8.gz
/usr/share/man/man8/qatlib_selinux.8.gz
/usr/share/man/man8/qdiskd_selinux.8.gz
/usr/share/man/man8/qemu_dm_selinux.8.gz
/usr/share/man/man8/qmail_clean_selinux.8.gz
/usr/share/man/man8/qmail_inject_selinux.8.gz
/usr/share/man/man8/qmail_local_selinux.8.gz
/usr/share/man/man8/qmail_lspawn_selinux.8.gz
/usr/share/man/man8/qmail_queue_selinux.8.gz
/usr/share/man/man8/qmail_remote_selinux.8.gz
/usr/share/man/man8/qmail_rspawn_selinux.8.gz
/usr/share/man/man8/qmail_send_selinux.8.gz
/usr/share/man/man8/qmail_smtpd_selinux.8.gz
/usr/share/man/man8/qmail_splogger_selinux.8.gz
/usr/share/man/man8/qmail_start_selinux.8.gz
/usr/share/man/man8/qmail_tcp_env_selinux.8.gz
/usr/share/man/man8/qpidd_selinux.8.gz
/usr/share/man/man8/quota_nld_selinux.8.gz
/usr/share/man/man8/quota_selinux.8.gz
/usr/share/man/man8/rabbitmq_selinux.8.gz
/usr/share/man/man8/racoon_selinux.8.gz
/usr/share/man/man8/radiusd_selinux.8.gz
/usr/share/man/man8/radvd_selinux.8.gz
/usr/share/man/man8/raid_selinux.8.gz
/usr/share/man/man8/rasdaemon_selinux.8.gz
/usr/share/man/man8/rdisc_selinux.8.gz
/usr/share/man/man8/readahead_selinux.8.gz
/usr/share/man/man8/realmd_selinux.8.gz
/usr/share/man/man8/rebootmgr_selinux.8.gz
/usr/share/man/man8/redis_selinux.8.gz
/usr/share/man/man8/regex_milter_selinux.8.gz
/usr/share/man/man8/remote_login_selinux.8.gz
/usr/share/man/man8/restorecond_selinux.8.gz
/usr/share/man/man8/rgmanager_selinux.8.gz
/usr/share/man/man8/rhcd_selinux.8.gz
/usr/share/man/man8/rhev_agentd_consolehelper_selinux.8.gz
/usr/share/man/man8/rhev_agentd_selinux.8.gz
/usr/share/man/man8/rhgb_selinux.8.gz
/usr/share/man/man8/rhnsd_selinux.8.gz
/usr/share/man/man8/rhsmcertd_selinux.8.gz
/usr/share/man/man8/ricci_modcluster_selinux.8.gz
/usr/share/man/man8/ricci_modclusterd_selinux.8.gz
/usr/share/man/man8/ricci_modlog_selinux.8.gz
/usr/share/man/man8/ricci_modrpm_selinux.8.gz
/usr/share/man/man8/ricci_modservice_selinux.8.gz
/usr/share/man/man8/ricci_modstorage_selinux.8.gz
/usr/share/man/man8/ricci_selinux.8.gz
/usr/share/man/man8/rlogind_selinux.8.gz
/usr/share/man/man8/rngd_selinux.8.gz
/usr/share/man/man8/roundup_selinux.8.gz
/usr/share/man/man8/rpcbind_selinux.8.gz
/usr/share/man/man8/rpcd_selinux.8.gz
/usr/share/man/man8/rpm_script_selinux.8.gz
/usr/share/man/man8/rpm_selinux.8.gz
/usr/share/man/man8/rpmdb_selinux.8.gz
/usr/share/man/man8/rrdcached_selinux.8.gz
/usr/share/man/man8/rshd_selinux.8.gz
/usr/share/man/man8/rshim_selinux.8.gz
/usr/share/man/man8/rssh_chroot_helper_selinux.8.gz
/usr/share/man/man8/rssh_selinux.8.gz
/usr/share/man/man8/rsync_selinux.8.gz
/usr/share/man/man8/rtas_errd_selinux.8.gz
/usr/share/man/man8/rtkit_daemon_selinux.8.gz
/usr/share/man/man8/rtorrent_selinux.8.gz
/usr/share/man/man8/run_init_selinux.8.gz
/usr/share/man/man8/rwho_selinux.8.gz
/usr/share/man/man8/samba_gpupdate_selinux.8.gz
/usr/share/man/man8/samba_net_selinux.8.gz
/usr/share/man/man8/samba_selinux.8.gz
/usr/share/man/man8/samba_unconfined_net_selinux.8.gz
/usr/share/man/man8/samba_unconfined_script_selinux.8.gz
/usr/share/man/man8/sambagui_selinux.8.gz
/usr/share/man/man8/sandbox_min_client_selinux.8.gz
/usr/share/man/man8/sandbox_min_selinux.8.gz
/usr/share/man/man8/sandbox_net_client_selinux.8.gz
/usr/share/man/man8/sandbox_net_selinux.8.gz
/usr/share/man/man8/sandbox_selinux.8.gz
/usr/share/man/man8/sandbox_web_client_selinux.8.gz
/usr/share/man/man8/sandbox_web_selinux.8.gz
/usr/share/man/man8/sandbox_x_client_selinux.8.gz
/usr/share/man/man8/sandbox_x_selinux.8.gz
/usr/share/man/man8/sandbox_xserver_selinux.8.gz
/usr/share/man/man8/sanlk_resetd_selinux.8.gz
/usr/share/man/man8/sanlock_selinux.8.gz
/usr/share/man/man8/sap_unconfined_selinux.8.gz
/usr/share/man/man8/saslauthd_selinux.8.gz
/usr/share/man/man8/sbd_selinux.8.gz
/usr/share/man/man8/sblim_gatherd_selinux.8.gz
/usr/share/man/man8/sblim_reposd_selinux.8.gz
/usr/share/man/man8/sblim_sfcbd_selinux.8.gz
/usr/share/man/man8/secadm_screen_selinux.8.gz
/usr/share/man/man8/secadm_selinux.8.gz
/usr/share/man/man8/secadm_su_selinux.8.gz
/usr/share/man/man8/secadm_sudo_selinux.8.gz
/usr/share/man/man8/sectoolm_selinux.8.gz
/usr/share/man/man8/selinux_autorelabel_generator_selinux.8.gz
/usr/share/man/man8/selinux_munin_plugin_selinux.8.gz
/usr/share/man/man8/semanage_selinux.8.gz
/usr/share/man/man8/sendmail_selinux.8.gz
/usr/share/man/man8/sensord_selinux.8.gz
/usr/share/man/man8/sepgsql_ranged_proc_selinux.8.gz
/usr/share/man/man8/sepgsql_trusted_proc_selinux.8.gz
/usr/share/man/man8/services_munin_plugin_selinux.8.gz
/usr/share/man/man8/setfiles_mac_selinux.8.gz
/usr/share/man/man8/setfiles_selinux.8.gz
/usr/share/man/man8/setkey_selinux.8.gz
/usr/share/man/man8/setrans_selinux.8.gz
/usr/share/man/man8/setroubleshoot_fixit_selinux.8.gz
/usr/share/man/man8/setroubleshootd_selinux.8.gz
/usr/share/man/man8/setsebool_selinux.8.gz
/usr/share/man/man8/sftpd_selinux.8.gz
/usr/share/man/man8/shorewall_selinux.8.gz
/usr/share/man/man8/showmount_selinux.8.gz
/usr/share/man/man8/slapd_selinux.8.gz
/usr/share/man/man8/slpd_selinux.8.gz
/usr/share/man/man8/smartmon_selinux.8.gz
/usr/share/man/man8/smbcontrol_selinux.8.gz
/usr/share/man/man8/smbd_selinux.8.gz
/usr/share/man/man8/smbmount_selinux.8.gz
/usr/share/man/man8/smokeping_cgi_script_selinux.8.gz
/usr/share/man/man8/smokeping_selinux.8.gz
/usr/share/man/man8/smoltclient_selinux.8.gz
/usr/share/man/man8/snapper_grub_plugin_selinux.8.gz
/usr/share/man/man8/snapperd_selinux.8.gz
/usr/share/man/man8/snmpd_selinux.8.gz
/usr/share/man/man8/snort_selinux.8.gz
/usr/share/man/man8/sosreport_selinux.8.gz
/usr/share/man/man8/soundd_selinux.8.gz
/usr/share/man/man8/spamass_milter_selinux.8.gz
/usr/share/man/man8/spamc_selinux.8.gz
/usr/share/man/man8/spamd_selinux.8.gz
/usr/share/man/man8/spamd_update_selinux.8.gz
/usr/share/man/man8/speech_dispatcher_selinux.8.gz
/usr/share/man/man8/squid_cron_selinux.8.gz
/usr/share/man/man8/squid_script_selinux.8.gz
/usr/share/man/man8/squid_selinux.8.gz
/usr/share/man/man8/srvsvcd_selinux.8.gz
/usr/share/man/man8/ssh_keygen_selinux.8.gz
/usr/share/man/man8/ssh_keysign_selinux.8.gz
/usr/share/man/man8/ssh_selinux.8.gz
/usr/share/man/man8/sshd_keygen_selinux.8.gz
/usr/share/man/man8/sshd_net_selinux.8.gz
/usr/share/man/man8/sshd_sandbox_selinux.8.gz
/usr/share/man/man8/sshd_selinux.8.gz
/usr/share/man/man8/sslh_selinux.8.gz
/usr/share/man/man8/sssd_selinux.8.gz
/usr/share/man/man8/sssd_selinux_manager_selinux.8.gz
/usr/share/man/man8/staff_consolehelper_selinux.8.gz
/usr/share/man/man8/staff_dbusd_selinux.8.gz
/usr/share/man/man8/staff_gkeyringd_selinux.8.gz
/usr/share/man/man8/staff_screen_selinux.8.gz
/usr/share/man/man8/staff_selinux.8.gz
/usr/share/man/man8/staff_seunshare_selinux.8.gz
/usr/share/man/man8/staff_ssh_agent_selinux.8.gz
/usr/share/man/man8/staff_sudo_selinux.8.gz
/usr/share/man/man8/staff_wine_selinux.8.gz
/usr/share/man/man8/stalld_selinux.8.gz
/usr/share/man/man8/stapserver_selinux.8.gz
/usr/share/man/man8/stratisd_selinux.8.gz
/usr/share/man/man8/stunnel_selinux.8.gz
/usr/share/man/man8/sulogin_selinux.8.gz
/usr/share/man/man8/svc_multilog_selinux.8.gz
/usr/share/man/man8/svc_run_selinux.8.gz
/usr/share/man/man8/svc_start_selinux.8.gz
/usr/share/man/man8/svirt_kvm_net_selinux.8.gz
/usr/share/man/man8/svirt_qemu_net_selinux.8.gz
/usr/share/man/man8/svirt_selinux.8.gz
/usr/share/man/man8/svirt_socket_selinux.8.gz
/usr/share/man/man8/svirt_tcg_selinux.8.gz
/usr/share/man/man8/svnserve_selinux.8.gz
/usr/share/man/man8/swat_selinux.8.gz
/usr/share/man/man8/swift_selinux.8.gz
/usr/share/man/man8/sysadm_dbusd_selinux.8.gz
/usr/share/man/man8/sysadm_gkeyringd_selinux.8.gz
/usr/share/man/man8/sysadm_passwd_selinux.8.gz
/usr/share/man/man8/sysadm_screen_selinux.8.gz
/usr/share/man/man8/sysadm_selinux.8.gz
/usr/share/man/man8/sysadm_seunshare_selinux.8.gz
/usr/share/man/man8/sysadm_ssh_agent_selinux.8.gz
/usr/share/man/man8/sysadm_su_selinux.8.gz
/usr/share/man/man8/sysadm_sudo_selinux.8.gz
/usr/share/man/man8/syslogd_selinux.8.gz
/usr/share/man/man8/syslogd_unconfined_script_selinux.8.gz
/usr/share/man/man8/sysstat_selinux.8.gz
/usr/share/man/man8/system_cronjob_selinux.8.gz
/usr/share/man/man8/system_dbusd_selinux.8.gz
/usr/share/man/man8/system_mail_selinux.8.gz
/usr/share/man/man8/system_munin_plugin_selinux.8.gz
/usr/share/man/man8/systemd_bless_boot_generator_selinux.8.gz
/usr/share/man/man8/systemd_bootchart_selinux.8.gz
/usr/share/man/man8/systemd_btrfs_soft_reboot_generator_selinux.8.gz
/usr/share/man/man8/systemd_coredump_selinux.8.gz
/usr/share/man/man8/systemd_cryptsetup_generator_selinux.8.gz
/usr/share/man/man8/systemd_debug_generator_selinux.8.gz
/usr/share/man/man8/systemd_fstab_generator_selinux.8.gz
/usr/share/man/man8/systemd_generic_generator_selinux.8.gz
/usr/share/man/man8/systemd_getty_generator_selinux.8.gz
/usr/share/man/man8/systemd_gpt_generator_selinux.8.gz
/usr/share/man/man8/systemd_growpart_generator_selinux.8.gz
/usr/share/man/man8/systemd_hostnamed_selinux.8.gz
/usr/share/man/man8/systemd_hwdb_selinux.8.gz
/usr/share/man/man8/systemd_ibft_rule_generator_selinux.8.gz
/usr/share/man/man8/systemd_importd_selinux.8.gz
/usr/share/man/man8/systemd_initctl_selinux.8.gz
/usr/share/man/man8/systemd_journal_upload_selinux.8.gz
/usr/share/man/man8/systemd_localed_selinux.8.gz
/usr/share/man/man8/systemd_logger_selinux.8.gz
/usr/share/man/man8/systemd_logind_selinux.8.gz
/usr/share/man/man8/systemd_machined_selinux.8.gz
/usr/share/man/man8/systemd_modules_load_selinux.8.gz
/usr/share/man/man8/systemd_mountfsd_selinux.8.gz
/usr/share/man/man8/systemd_network_generator_selinux.8.gz
/usr/share/man/man8/systemd_networkd_selinux.8.gz
/usr/share/man/man8/systemd_notify_selinux.8.gz
/usr/share/man/man8/systemd_nsresourced_selinux.8.gz
/usr/share/man/man8/systemd_passwd_agent_selinux.8.gz
/usr/share/man/man8/systemd_pcrextend_selinux.8.gz
/usr/share/man/man8/systemd_pcrlock_selinux.8.gz
/usr/share/man/man8/systemd_pstore_selinux.8.gz
/usr/share/man/man8/systemd_rc_local_generator_selinux.8.gz
/usr/share/man/man8/systemd_resolved_selinux.8.gz
/usr/share/man/man8/systemd_rfkill_selinux.8.gz
/usr/share/man/man8/systemd_sleep_selinux.8.gz
/usr/share/man/man8/systemd_socket_proxyd_selinux.8.gz
/usr/share/man/man8/systemd_ssh_generator_selinux.8.gz
/usr/share/man/man8/systemd_status_mail_generator_selinux.8.gz
/usr/share/man/man8/systemd_sysctl_selinux.8.gz
/usr/share/man/man8/systemd_sysv_generator_selinux.8.gz
/usr/share/man/man8/systemd_timedated_selinux.8.gz
/usr/share/man/man8/systemd_tmpfiles_selinux.8.gz
/usr/share/man/man8/systemd_tpm2_generator_selinux.8.gz
/usr/share/man/man8/systemd_udev_trigger_generator_selinux.8.gz
/usr/share/man/man8/systemd_userdbd_selinux.8.gz
/usr/share/man/man8/systemd_zram_generator_selinux.8.gz
/usr/share/man/man8/tangd_selinux.8.gz
/usr/share/man/man8/targetclid_selinux.8.gz
/usr/share/man/man8/targetd_selinux.8.gz
/usr/share/man/man8/tcpd_selinux.8.gz
/usr/share/man/man8/tcsd_selinux.8.gz
/usr/share/man/man8/telepathy_gabble_selinux.8.gz
/usr/share/man/man8/telepathy_idle_selinux.8.gz
/usr/share/man/man8/telepathy_logger_selinux.8.gz
/usr/share/man/man8/telepathy_mission_control_selinux.8.gz
/usr/share/man/man8/telepathy_msn_selinux.8.gz
/usr/share/man/man8/telepathy_salut_selinux.8.gz
/usr/share/man/man8/telepathy_sofiasip_selinux.8.gz
/usr/share/man/man8/telepathy_stream_engine_selinux.8.gz
/usr/share/man/man8/telepathy_sunshine_selinux.8.gz
/usr/share/man/man8/telnetd_selinux.8.gz
/usr/share/man/man8/tftpd_selinux.8.gz
/usr/share/man/man8/tgtd_selinux.8.gz
/usr/share/man/man8/thin_aeolus_configserver_selinux.8.gz
/usr/share/man/man8/thin_selinux.8.gz
/usr/share/man/man8/thumb_selinux.8.gz
/usr/share/man/man8/timemaster_selinux.8.gz
/usr/share/man/man8/tlp_selinux.8.gz
/usr/share/man/man8/tmpreaper_selinux.8.gz
/usr/share/man/man8/tomcat_selinux.8.gz
/usr/share/man/man8/tor_selinux.8.gz
/usr/share/man/man8/traceroute_selinux.8.gz
/usr/share/man/man8/tuned_selinux.8.gz
/usr/share/man/man8/tvtime_selinux.8.gz
/usr/share/man/man8/udev_selinux.8.gz
/usr/share/man/man8/ulogd_selinux.8.gz
/usr/share/man/man8/uml_selinux.8.gz
/usr/share/man/man8/uml_switch_selinux.8.gz
/usr/share/man/man8/unconfined_cronjob_selinux.8.gz
/usr/share/man/man8/unconfined_dbusd_selinux.8.gz
/usr/share/man/man8/unconfined_mount_selinux.8.gz
/usr/share/man/man8/unconfined_munin_plugin_selinux.8.gz
/usr/share/man/man8/unconfined_selinux.8.gz
/usr/share/man/man8/unconfined_sendmail_selinux.8.gz
/usr/share/man/man8/unconfined_service_selinux.8.gz
/usr/share/man/man8/updfstab_selinux.8.gz
/usr/share/man/man8/updpwd_selinux.8.gz
/usr/share/man/man8/usbmodules_selinux.8.gz
/usr/share/man/man8/usbmuxd_selinux.8.gz
/usr/share/man/man8/user_dbusd_selinux.8.gz
/usr/share/man/man8/user_gkeyringd_selinux.8.gz
/usr/share/man/man8/user_mail_selinux.8.gz
/usr/share/man/man8/user_screen_selinux.8.gz
/usr/share/man/man8/user_selinux.8.gz
/usr/share/man/man8/user_seunshare_selinux.8.gz
/usr/share/man/man8/user_ssh_agent_selinux.8.gz
/usr/share/man/man8/user_wine_selinux.8.gz
/usr/share/man/man8/useradd_selinux.8.gz
/usr/share/man/man8/usernetctl_selinux.8.gz
/usr/share/man/man8/utempter_selinux.8.gz
/usr/share/man/man8/uucpd_selinux.8.gz
/usr/share/man/man8/uuidd_selinux.8.gz
/usr/share/man/man8/uux_selinux.8.gz
/usr/share/man/man8/varnishd_selinux.8.gz
/usr/share/man/man8/varnishlog_selinux.8.gz
/usr/share/man/man8/vdagent_selinux.8.gz
/usr/share/man/man8/vhostmd_selinux.8.gz
/usr/share/man/man8/virsh_selinux.8.gz
/usr/share/man/man8/virsh_ssh_selinux.8.gz
/usr/share/man/man8/virt_bridgehelper_selinux.8.gz
/usr/share/man/man8/virt_dbus_selinux.8.gz
/usr/share/man/man8/virt_hook_unconfined_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_unconfined_selinux.8.gz
/usr/share/man/man8/virt_qmf_selinux.8.gz
/usr/share/man/man8/virt_selinux.8.gz
/usr/share/man/man8/virtd_lxc_selinux.8.gz
/usr/share/man/man8/virtd_selinux.8.gz
/usr/share/man/man8/virtinterfaced_selinux.8.gz
/usr/share/man/man8/virtlogd_selinux.8.gz
/usr/share/man/man8/virtnetworkd_selinux.8.gz
/usr/share/man/man8/virtnodedevd_selinux.8.gz
/usr/share/man/man8/virtnwfilterd_selinux.8.gz
/usr/share/man/man8/virtproxyd_selinux.8.gz
/usr/share/man/man8/virtqemud_selinux.8.gz
/usr/share/man/man8/virtsecretd_selinux.8.gz
/usr/share/man/man8/virtstoraged_selinux.8.gz
/usr/share/man/man8/virtvboxd_selinux.8.gz
/usr/share/man/man8/virtvzd_selinux.8.gz
/usr/share/man/man8/virtxend_selinux.8.gz
/usr/share/man/man8/vlock_selinux.8.gz
/usr/share/man/man8/vmtools_helper_selinux.8.gz
/usr/share/man/man8/vmtools_selinux.8.gz
/usr/share/man/man8/vmtools_unconfined_selinux.8.gz
/usr/share/man/man8/vmware_host_selinux.8.gz
/usr/share/man/man8/vmware_selinux.8.gz
/usr/share/man/man8/vnstat_selinux.8.gz
/usr/share/man/man8/vnstatd_selinux.8.gz
/usr/share/man/man8/vpnc_selinux.8.gz
/usr/share/man/man8/w3c_validator_script_selinux.8.gz
/usr/share/man/man8/watchdog_selinux.8.gz
/usr/share/man/man8/watchdog_unconfined_selinux.8.gz
/usr/share/man/man8/wdmd_selinux.8.gz
/usr/share/man/man8/webadm_selinux.8.gz
/usr/share/man/man8/webalizer_script_selinux.8.gz
/usr/share/man/man8/webalizer_selinux.8.gz
/usr/share/man/man8/wicked_selinux.8.gz
/usr/share/man/man8/wicked_ssh_selinux.8.gz
/usr/share/man/man8/winbind_helper_selinux.8.gz
/usr/share/man/man8/winbind_rpcd_selinux.8.gz
/usr/share/man/man8/winbind_selinux.8.gz
/usr/share/man/man8/wine_selinux.8.gz
/usr/share/man/man8/wireguard_selinux.8.gz
/usr/share/man/man8/wireshark_selinux.8.gz
/usr/share/man/man8/wpa_cli_selinux.8.gz
/usr/share/man/man8/xauth_selinux.8.gz
/usr/share/man/man8/xdm_selinux.8.gz
/usr/share/man/man8/xdm_unconfined_selinux.8.gz
/usr/share/man/man8/xenconsoled_selinux.8.gz
/usr/share/man/man8/xend_selinux.8.gz
/usr/share/man/man8/xenstored_selinux.8.gz
/usr/share/man/man8/xguest_dbusd_selinux.8.gz
/usr/share/man/man8/xguest_gkeyringd_selinux.8.gz
/usr/share/man/man8/xguest_selinux.8.gz
/usr/share/man/man8/xserver_selinux.8.gz
/usr/share/man/man8/ypbind_selinux.8.gz
/usr/share/man/man8/yppasswdd_selinux.8.gz
/usr/share/man/man8/ypserv_selinux.8.gz
/usr/share/man/man8/ypxfr_selinux.8.gz
/usr/share/man/man8/zabbix_agent_selinux.8.gz
/usr/share/man/man8/zabbix_script_selinux.8.gz
/usr/share/man/man8/zabbix_selinux.8.gz
/usr/share/man/man8/zarafa_deliver_selinux.8.gz
/usr/share/man/man8/zarafa_gateway_selinux.8.gz
/usr/share/man/man8/zarafa_ical_selinux.8.gz
/usr/share/man/man8/zarafa_indexer_selinux.8.gz
/usr/share/man/man8/zarafa_monitor_selinux.8.gz
/usr/share/man/man8/zarafa_server_selinux.8.gz
/usr/share/man/man8/zarafa_spooler_selinux.8.gz
/usr/share/man/man8/zebra_selinux.8.gz
/usr/share/man/man8/zoneminder_script_selinux.8.gz
/usr/share/man/man8/zoneminder_selinux.8.gz
/usr/share/man/man8/zos_remote_selinux.8.gz
/usr/share/man/ru/man8/ftpd_selinux.8.gz
/usr/share/man/ru/man8/httpd_selinux.8.gz
/usr/share/man/ru/man8/kerberos_selinux.8.gz
/usr/share/man/ru/man8/named_selinux.8.gz
/usr/share/man/ru/man8/nfs_selinux.8.gz
/usr/share/man/ru/man8/rsync_selinux.8.gz
/usr/share/man/ru/man8/samba_selinux.8.gz
/usr/share/man/ru/man8/ypbind_selinux.8.gz
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/index.html
/usr/share/selinux/devel/html/style.css
/usr/share/selinux/devel/include
/usr/share/selinux/devel/include/Makefile
/usr/share/selinux/devel/include/admin
/usr/share/selinux/devel/include/admin.xml
/usr/share/selinux/devel/include/admin/bootloader.if
/usr/share/selinux/devel/include/admin/consoletype.if
/usr/share/selinux/devel/include/admin/dmesg.if
/usr/share/selinux/devel/include/admin/netutils.if
/usr/share/selinux/devel/include/admin/su.if
/usr/share/selinux/devel/include/admin/sudo.if
/usr/share/selinux/devel/include/admin/usermanage.if
/usr/share/selinux/devel/include/apps
/usr/share/selinux/devel/include/apps.xml
/usr/share/selinux/devel/include/apps/seunshare.if
/usr/share/selinux/devel/include/build.conf
/usr/share/selinux/devel/include/contrib
/usr/share/selinux/devel/include/contrib.xml
/usr/share/selinux/devel/include/contrib/abrt.if
/usr/share/selinux/devel/include/contrib/accountsd.if
/usr/share/selinux/devel/include/contrib/acct.if
/usr/share/selinux/devel/include/contrib/afs.if
/usr/share/selinux/devel/include/contrib/afterburn.if
/usr/share/selinux/devel/include/contrib/aiccu.if
/usr/share/selinux/devel/include/contrib/aide.if
/usr/share/selinux/devel/include/contrib/aisexec.if
/usr/share/selinux/devel/include/contrib/ajaxterm.if
/usr/share/selinux/devel/include/contrib/alsa.if
/usr/share/selinux/devel/include/contrib/amanda.if
/usr/share/selinux/devel/include/contrib/amavis.if
/usr/share/selinux/devel/include/contrib/amtu.if
/usr/share/selinux/devel/include/contrib/anaconda.if
/usr/share/selinux/devel/include/contrib/antivirus.if
/usr/share/selinux/devel/include/contrib/apache.if
/usr/share/selinux/devel/include/contrib/apcupsd.if
/usr/share/selinux/devel/include/contrib/apm.if
/usr/share/selinux/devel/include/contrib/apt.if
/usr/share/selinux/devel/include/contrib/arpwatch.if
/usr/share/selinux/devel/include/contrib/asterisk.if
/usr/share/selinux/devel/include/contrib/authconfig.if
/usr/share/selinux/devel/include/contrib/automount.if
/usr/share/selinux/devel/include/contrib/avahi.if
/usr/share/selinux/devel/include/contrib/awstats.if
/usr/share/selinux/devel/include/contrib/backup.if
/usr/share/selinux/devel/include/contrib/bacula.if
/usr/share/selinux/devel/include/contrib/bcfg2.if
/usr/share/selinux/devel/include/contrib/bind.if
/usr/share/selinux/devel/include/contrib/bird.if
/usr/share/selinux/devel/include/contrib/bitlbee.if
/usr/share/selinux/devel/include/contrib/blkmapd.if
/usr/share/selinux/devel/include/contrib/blueman.if
/usr/share/selinux/devel/include/contrib/bluetooth.if
/usr/share/selinux/devel/include/contrib/boinc.if
/usr/share/selinux/devel/include/contrib/boltd.if
/usr/share/selinux/devel/include/contrib/boothd.if
/usr/share/selinux/devel/include/contrib/bootupd.if
/usr/share/selinux/devel/include/contrib/brctl.if
/usr/share/selinux/devel/include/contrib/brltty.if
/usr/share/selinux/devel/include/contrib/bugzilla.if
/usr/share/selinux/devel/include/contrib/bumblebee.if
/usr/share/selinux/devel/include/contrib/cachefilesd.if
/usr/share/selinux/devel/include/contrib/calamaris.if
/usr/share/selinux/devel/include/contrib/callweaver.if
/usr/share/selinux/devel/include/contrib/canna.if
/usr/share/selinux/devel/include/contrib/ccs.if
/usr/share/selinux/devel/include/contrib/cdrecord.if
/usr/share/selinux/devel/include/contrib/certmaster.if
/usr/share/selinux/devel/include/contrib/certmonger.if
/usr/share/selinux/devel/include/contrib/certwatch.if
/usr/share/selinux/devel/include/contrib/cfengine.if
/usr/share/selinux/devel/include/contrib/cgroup.if
/usr/share/selinux/devel/include/contrib/chrome.if
/usr/share/selinux/devel/include/contrib/chronyd.if
/usr/share/selinux/devel/include/contrib/cifsutils.if
/usr/share/selinux/devel/include/contrib/cinder.if
/usr/share/selinux/devel/include/contrib/cipe.if
/usr/share/selinux/devel/include/contrib/clamav.if
/usr/share/selinux/devel/include/contrib/clockspeed.if
/usr/share/selinux/devel/include/contrib/clogd.if
/usr/share/selinux/devel/include/contrib/cloudform.if
/usr/share/selinux/devel/include/contrib/cmirrord.if
/usr/share/selinux/devel/include/contrib/cobbler.if
/usr/share/selinux/devel/include/contrib/cockpit.if
/usr/share/selinux/devel/include/contrib/collectd.if
/usr/share/selinux/devel/include/contrib/colord.if
/usr/share/selinux/devel/include/contrib/comsat.if
/usr/share/selinux/devel/include/contrib/condor.if
/usr/share/selinux/devel/include/contrib/conman.if
/usr/share/selinux/devel/include/contrib/conntrackd.if
/usr/share/selinux/devel/include/contrib/consolekit.if
/usr/share/selinux/devel/include/contrib/coreos_installer.if
/usr/share/selinux/devel/include/contrib/corosync.if
/usr/share/selinux/devel/include/contrib/couchdb.if
/usr/share/selinux/devel/include/contrib/courier.if
/usr/share/selinux/devel/include/contrib/cpucontrol.if
/usr/share/selinux/devel/include/contrib/cpufreqselector.if
/usr/share/selinux/devel/include/contrib/cpuplug.if
/usr/share/selinux/devel/include/contrib/cron.if
/usr/share/selinux/devel/include/contrib/ctdb.if
/usr/share/selinux/devel/include/contrib/cups.if
/usr/share/selinux/devel/include/contrib/cvs.if
/usr/share/selinux/devel/include/contrib/cyphesis.if
/usr/share/selinux/devel/include/contrib/cyrus.if
/usr/share/selinux/devel/include/contrib/daemontools.if
/usr/share/selinux/devel/include/contrib/dante.if
/usr/share/selinux/devel/include/contrib/dbadm.if
/usr/share/selinux/devel/include/contrib/dbskk.if
/usr/share/selinux/devel/include/contrib/dbus.if
/usr/share/selinux/devel/include/contrib/dcc.if
/usr/share/selinux/devel/include/contrib/ddclient.if
/usr/share/selinux/devel/include/contrib/ddcprobe.if
/usr/share/selinux/devel/include/contrib/denyhosts.if
/usr/share/selinux/devel/include/contrib/devicekit.if
/usr/share/selinux/devel/include/contrib/dhcp.if
/usr/share/selinux/devel/include/contrib/dictd.if
/usr/share/selinux/devel/include/contrib/dirmngr.if
/usr/share/selinux/devel/include/contrib/dirsrv-admin.if
/usr/share/selinux/devel/include/contrib/dirsrv.if
/usr/share/selinux/devel/include/contrib/distcc.if
/usr/share/selinux/devel/include/contrib/djbdns.if
/usr/share/selinux/devel/include/contrib/dkim.if
/usr/share/selinux/devel/include/contrib/dmidecode.if
/usr/share/selinux/devel/include/contrib/dnsmasq.if
/usr/share/selinux/devel/include/contrib/dnssec.if
/usr/share/selinux/devel/include/contrib/dovecot.if
/usr/share/selinux/devel/include/contrib/dpkg.if
/usr/share/selinux/devel/include/contrib/drbd.if
/usr/share/selinux/devel/include/contrib/dspam.if
/usr/share/selinux/devel/include/contrib/entropyd.if
/usr/share/selinux/devel/include/contrib/evolution.if
/usr/share/selinux/devel/include/contrib/exim.if
/usr/share/selinux/devel/include/contrib/fail2ban.if
/usr/share/selinux/devel/include/contrib/fcoe.if
/usr/share/selinux/devel/include/contrib/fdo.if
/usr/share/selinux/devel/include/contrib/fedoratp.if
/usr/share/selinux/devel/include/contrib/fetchmail.if
/usr/share/selinux/devel/include/contrib/finger.if
/usr/share/selinux/devel/include/contrib/firewalld.if
/usr/share/selinux/devel/include/contrib/firewallgui.if
/usr/share/selinux/devel/include/contrib/firstboot.if
/usr/share/selinux/devel/include/contrib/fprintd.if
/usr/share/selinux/devel/include/contrib/freeipmi.if
/usr/share/selinux/devel/include/contrib/freqset.if
/usr/share/selinux/devel/include/contrib/ftp.if
/usr/share/selinux/devel/include/contrib/fwupd.if
/usr/share/selinux/devel/include/contrib/games.if
/usr/share/selinux/devel/include/contrib/gatekeeper.if
/usr/share/selinux/devel/include/contrib/gdomap.if
/usr/share/selinux/devel/include/contrib/geoclue.if
/usr/share/selinux/devel/include/contrib/git.if
/usr/share/selinux/devel/include/contrib/gitosis.if
/usr/share/selinux/devel/include/contrib/glance.if
/usr/share/selinux/devel/include/contrib/glusterd.if
/usr/share/selinux/devel/include/contrib/gnome.if
/usr/share/selinux/devel/include/contrib/gnomeclock.if
/usr/share/selinux/devel/include/contrib/gpg.if
/usr/share/selinux/devel/include/contrib/gpm.if
/usr/share/selinux/devel/include/contrib/gpsd.if
/usr/share/selinux/devel/include/contrib/gssproxy.if
/usr/share/selinux/devel/include/contrib/hadoop.if
/usr/share/selinux/devel/include/contrib/hddtemp.if
/usr/share/selinux/devel/include/contrib/hostapd.if
/usr/share/selinux/devel/include/contrib/howl.if
/usr/share/selinux/devel/include/contrib/hsqldb.if
/usr/share/selinux/devel/include/contrib/hwloc.if
/usr/share/selinux/devel/include/contrib/hypervkvp.if
/usr/share/selinux/devel/include/contrib/i18n_input.if
/usr/share/selinux/devel/include/contrib/ibacm.if
/usr/share/selinux/devel/include/contrib/ica.if
/usr/share/selinux/devel/include/contrib/icecast.if
/usr/share/selinux/devel/include/contrib/ifplugd.if
/usr/share/selinux/devel/include/contrib/imaze.if
/usr/share/selinux/devel/include/contrib/inetd.if
/usr/share/selinux/devel/include/contrib/inn.if
/usr/share/selinux/devel/include/contrib/insights_client.if
/usr/share/selinux/devel/include/contrib/iodine.if
/usr/share/selinux/devel/include/contrib/iotop.if
/usr/share/selinux/devel/include/contrib/ipa.if
/usr/share/selinux/devel/include/contrib/ipmievd.if
/usr/share/selinux/devel/include/contrib/irc.if
/usr/share/selinux/devel/include/contrib/ircd.if
/usr/share/selinux/devel/include/contrib/irqbalance.if
/usr/share/selinux/devel/include/contrib/iscsi.if
/usr/share/selinux/devel/include/contrib/isns.if
/usr/share/selinux/devel/include/contrib/jabber.if
/usr/share/selinux/devel/include/contrib/java.if
/usr/share/selinux/devel/include/contrib/jetty.if
/usr/share/selinux/devel/include/contrib/jockey.if
/usr/share/selinux/devel/include/contrib/journalctl.if
/usr/share/selinux/devel/include/contrib/kafs.if
/usr/share/selinux/devel/include/contrib/kanidm_unixd.if
/usr/share/selinux/devel/include/contrib/kdump.if
/usr/share/selinux/devel/include/contrib/kdumpgui.if
/usr/share/selinux/devel/include/contrib/keepalived.if
/usr/share/selinux/devel/include/contrib/kerberos.if
/usr/share/selinux/devel/include/contrib/kerneloops.if
/usr/share/selinux/devel/include/contrib/keyboardd.if
/usr/share/selinux/devel/include/contrib/keystone.if
/usr/share/selinux/devel/include/contrib/keyutils.if
/usr/share/selinux/devel/include/contrib/kismet.if
/usr/share/selinux/devel/include/contrib/kiwi.if
/usr/share/selinux/devel/include/contrib/kmscon.if
/usr/share/selinux/devel/include/contrib/kpatch.if
/usr/share/selinux/devel/include/contrib/ksmtuned.if
/usr/share/selinux/devel/include/contrib/ktalk.if
/usr/share/selinux/devel/include/contrib/l2tp.if
/usr/share/selinux/devel/include/contrib/ldap.if
/usr/share/selinux/devel/include/contrib/libalternatives.if
/usr/share/selinux/devel/include/contrib/lightsquid.if
/usr/share/selinux/devel/include/contrib/likewise.if
/usr/share/selinux/devel/include/contrib/linuxptp.if
/usr/share/selinux/devel/include/contrib/lircd.if
/usr/share/selinux/devel/include/contrib/livecd.if
/usr/share/selinux/devel/include/contrib/lldpad.if
/usr/share/selinux/devel/include/contrib/loadkeys.if
/usr/share/selinux/devel/include/contrib/lockdev.if
/usr/share/selinux/devel/include/contrib/logrotate.if
/usr/share/selinux/devel/include/contrib/logwatch.if
/usr/share/selinux/devel/include/contrib/lpd.if
/usr/share/selinux/devel/include/contrib/lsm.if
/usr/share/selinux/devel/include/contrib/lttng-tools.if
/usr/share/selinux/devel/include/contrib/mailman.if
/usr/share/selinux/devel/include/contrib/mailscanner.if
/usr/share/selinux/devel/include/contrib/man2html.if
/usr/share/selinux/devel/include/contrib/mandb.if
/usr/share/selinux/devel/include/contrib/mcelog.if
/usr/share/selinux/devel/include/contrib/mediawiki.if
/usr/share/selinux/devel/include/contrib/memcached.if
/usr/share/selinux/devel/include/contrib/milter.if
/usr/share/selinux/devel/include/contrib/minidlna.if
/usr/share/selinux/devel/include/contrib/minissdpd.if
/usr/share/selinux/devel/include/contrib/mip6d.if
/usr/share/selinux/devel/include/contrib/mirrormanager.if
/usr/share/selinux/devel/include/contrib/mock.if
/usr/share/selinux/devel/include/contrib/modemmanager.if
/usr/share/selinux/devel/include/contrib/mojomojo.if
/usr/share/selinux/devel/include/contrib/mon_statd.if
/usr/share/selinux/devel/include/contrib/mongodb.if
/usr/share/selinux/devel/include/contrib/mono.if
/usr/share/selinux/devel/include/contrib/monop.if
/usr/share/selinux/devel/include/contrib/motion.if
/usr/share/selinux/devel/include/contrib/mozilla.if
/usr/share/selinux/devel/include/contrib/mpd.if
/usr/share/selinux/devel/include/contrib/mplayer.if
/usr/share/selinux/devel/include/contrib/mptcpd.if
/usr/share/selinux/devel/include/contrib/mrtg.if
/usr/share/selinux/devel/include/contrib/mta.if
/usr/share/selinux/devel/include/contrib/munin.if
/usr/share/selinux/devel/include/contrib/mysql.if
/usr/share/selinux/devel/include/contrib/mythtv.if
/usr/share/selinux/devel/include/contrib/naemon.if
/usr/share/selinux/devel/include/contrib/nagios.if
/usr/share/selinux/devel/include/contrib/namespace.if
/usr/share/selinux/devel/include/contrib/ncftool.if
/usr/share/selinux/devel/include/contrib/nessus.if
/usr/share/selinux/devel/include/contrib/networkmanager.if
/usr/share/selinux/devel/include/contrib/ninfod.if
/usr/share/selinux/devel/include/contrib/nis.if
/usr/share/selinux/devel/include/contrib/nova.if
/usr/share/selinux/devel/include/contrib/nscd.if
/usr/share/selinux/devel/include/contrib/nsd.if
/usr/share/selinux/devel/include/contrib/nslcd.if
/usr/share/selinux/devel/include/contrib/ntop.if
/usr/share/selinux/devel/include/contrib/ntp.if
/usr/share/selinux/devel/include/contrib/numad.if
/usr/share/selinux/devel/include/contrib/nut.if
/usr/share/selinux/devel/include/contrib/nvme_stas.if
/usr/share/selinux/devel/include/contrib/nx.if
/usr/share/selinux/devel/include/contrib/oav.if
/usr/share/selinux/devel/include/contrib/obex.if
/usr/share/selinux/devel/include/contrib/oddjob.if
/usr/share/selinux/devel/include/contrib/oident.if
/usr/share/selinux/devel/include/contrib/opafm.if
/usr/share/selinux/devel/include/contrib/openca.if
/usr/share/selinux/devel/include/contrib/openct.if
/usr/share/selinux/devel/include/contrib/opendnssec.if
/usr/share/selinux/devel/include/contrib/openfortivpn.if
/usr/share/selinux/devel/include/contrib/openhpid.if
/usr/share/selinux/devel/include/contrib/openshift-origin.if
/usr/share/selinux/devel/include/contrib/openshift.if
/usr/share/selinux/devel/include/contrib/opensm.if
/usr/share/selinux/devel/include/contrib/openvpn.if
/usr/share/selinux/devel/include/contrib/openvswitch.if
/usr/share/selinux/devel/include/contrib/openwsman.if
/usr/share/selinux/devel/include/contrib/oracleasm.if
/usr/share/selinux/devel/include/contrib/osad.if
/usr/share/selinux/devel/include/contrib/pacemaker.if
/usr/share/selinux/devel/include/contrib/packagekit.if
/usr/share/selinux/devel/include/contrib/pads.if
/usr/share/selinux/devel/include/contrib/passenger.if
/usr/share/selinux/devel/include/contrib/passt.if
/usr/share/selinux/devel/include/contrib/pcmcia.if
/usr/share/selinux/devel/include/contrib/pcp.if
/usr/share/selinux/devel/include/contrib/pcscd.if
/usr/share/selinux/devel/include/contrib/pdns.if
/usr/share/selinux/devel/include/contrib/pegasus.if
/usr/share/selinux/devel/include/contrib/perdition.if
/usr/share/selinux/devel/include/contrib/pesign.if
/usr/share/selinux/devel/include/contrib/pingd.if
/usr/share/selinux/devel/include/contrib/piranha.if
/usr/share/selinux/devel/include/contrib/pkcs.if
/usr/share/selinux/devel/include/contrib/pkcs11proxyd.if
/usr/share/selinux/devel/include/contrib/pki.if
/usr/share/selinux/devel/include/contrib/plymouthd.if
/usr/share/selinux/devel/include/contrib/podsleuth.if
/usr/share/selinux/devel/include/contrib/policykit.if
/usr/share/selinux/devel/include/contrib/polipo.if
/usr/share/selinux/devel/include/contrib/portage.if
/usr/share/selinux/devel/include/contrib/portmap.if
/usr/share/selinux/devel/include/contrib/portreserve.if
/usr/share/selinux/devel/include/contrib/portslave.if
/usr/share/selinux/devel/include/contrib/postfix.if
/usr/share/selinux/devel/include/contrib/postfixpolicyd.if
/usr/share/selinux/devel/include/contrib/postgrey.if
/usr/share/selinux/devel/include/contrib/ppp.if
/usr/share/selinux/devel/include/contrib/prelink.if
/usr/share/selinux/devel/include/contrib/prelude.if
/usr/share/selinux/devel/include/contrib/privoxy.if
/usr/share/selinux/devel/include/contrib/procmail.if
/usr/share/selinux/devel/include/contrib/prosody.if
/usr/share/selinux/devel/include/contrib/psad.if
/usr/share/selinux/devel/include/contrib/ptchown.if
/usr/share/selinux/devel/include/contrib/pulseaudio.if
/usr/share/selinux/devel/include/contrib/puppet.if
/usr/share/selinux/devel/include/contrib/pwauth.if
/usr/share/selinux/devel/include/contrib/pxe.if
/usr/share/selinux/devel/include/contrib/pyzor.if
/usr/share/selinux/devel/include/contrib/qatlib.if
/usr/share/selinux/devel/include/contrib/qemu.if
/usr/share/selinux/devel/include/contrib/qmail.if
/usr/share/selinux/devel/include/contrib/qpid.if
/usr/share/selinux/devel/include/contrib/quantum.if
/usr/share/selinux/devel/include/contrib/quota.if
/usr/share/selinux/devel/include/contrib/rabbitmq.if
/usr/share/selinux/devel/include/contrib/radius.if
/usr/share/selinux/devel/include/contrib/radvd.if
/usr/share/selinux/devel/include/contrib/raid.if
/usr/share/selinux/devel/include/contrib/rasdaemon.if
/usr/share/selinux/devel/include/contrib/razor.if
/usr/share/selinux/devel/include/contrib/rdisc.if
/usr/share/selinux/devel/include/contrib/readahead.if
/usr/share/selinux/devel/include/contrib/realmd.if
/usr/share/selinux/devel/include/contrib/rebootmgr.if
/usr/share/selinux/devel/include/contrib/redis.if
/usr/share/selinux/devel/include/contrib/remotelogin.if
/usr/share/selinux/devel/include/contrib/resmgr.if
/usr/share/selinux/devel/include/contrib/rgmanager.if
/usr/share/selinux/devel/include/contrib/rhcd.if
/usr/share/selinux/devel/include/contrib/rhcs.if
/usr/share/selinux/devel/include/contrib/rhev.if
/usr/share/selinux/devel/include/contrib/rhgb.if
/usr/share/selinux/devel/include/contrib/rhnsd.if
/usr/share/selinux/devel/include/contrib/rhsmcertd.if
/usr/share/selinux/devel/include/contrib/ricci.if
/usr/share/selinux/devel/include/contrib/rkhunter.if
/usr/share/selinux/devel/include/contrib/rkt.if
/usr/share/selinux/devel/include/contrib/rlogin.if
/usr/share/selinux/devel/include/contrib/rngd.if
/usr/share/selinux/devel/include/contrib/rolekit.if
/usr/share/selinux/devel/include/contrib/roundup.if
/usr/share/selinux/devel/include/contrib/rpc.if
/usr/share/selinux/devel/include/contrib/rpcbind.if
/usr/share/selinux/devel/include/contrib/rpm.if
/usr/share/selinux/devel/include/contrib/rrdcached.if
/usr/share/selinux/devel/include/contrib/rshd.if
/usr/share/selinux/devel/include/contrib/rshim.if
/usr/share/selinux/devel/include/contrib/rssh.if
/usr/share/selinux/devel/include/contrib/rsync.if
/usr/share/selinux/devel/include/contrib/rtas.if
/usr/share/selinux/devel/include/contrib/rtkit.if
/usr/share/selinux/devel/include/contrib/rtorrent.if
/usr/share/selinux/devel/include/contrib/rwho.if
/usr/share/selinux/devel/include/contrib/samba.if
/usr/share/selinux/devel/include/contrib/sambagui.if
/usr/share/selinux/devel/include/contrib/samhain.if
/usr/share/selinux/devel/include/contrib/sandbox.if
/usr/share/selinux/devel/include/contrib/sandboxX.if
/usr/share/selinux/devel/include/contrib/sanlock.if
/usr/share/selinux/devel/include/contrib/sap.if
/usr/share/selinux/devel/include/contrib/sasl.if
/usr/share/selinux/devel/include/contrib/sbd.if
/usr/share/selinux/devel/include/contrib/sblim.if
/usr/share/selinux/devel/include/contrib/screen.if
/usr/share/selinux/devel/include/contrib/sectoolm.if
/usr/share/selinux/devel/include/contrib/sendmail.if
/usr/share/selinux/devel/include/contrib/sensord.if
/usr/share/selinux/devel/include/contrib/setroubleshoot.if
/usr/share/selinux/devel/include/contrib/sge.if
/usr/share/selinux/devel/include/contrib/shorewall.if
/usr/share/selinux/devel/include/contrib/shutdown.if
/usr/share/selinux/devel/include/contrib/slocate.if
/usr/share/selinux/devel/include/contrib/slpd.if
/usr/share/selinux/devel/include/contrib/slrnpull.if
/usr/share/selinux/devel/include/contrib/smartmon.if
/usr/share/selinux/devel/include/contrib/smokeping.if
/usr/share/selinux/devel/include/contrib/smoltclient.if
/usr/share/selinux/devel/include/contrib/smsd.if
/usr/share/selinux/devel/include/contrib/smstools.if
/usr/share/selinux/devel/include/contrib/snapper.if
/usr/share/selinux/devel/include/contrib/snmp.if
/usr/share/selinux/devel/include/contrib/snort.if
/usr/share/selinux/devel/include/contrib/sosreport.if
/usr/share/selinux/devel/include/contrib/soundserver.if
/usr/share/selinux/devel/include/contrib/spamassassin.if
/usr/share/selinux/devel/include/contrib/speech-dispatcher.if
/usr/share/selinux/devel/include/contrib/squid.if
/usr/share/selinux/devel/include/contrib/sslh.if
/usr/share/selinux/devel/include/contrib/sssd.if
/usr/share/selinux/devel/include/contrib/stalld.if
/usr/share/selinux/devel/include/contrib/stapserver.if
/usr/share/selinux/devel/include/contrib/stratisd.if
/usr/share/selinux/devel/include/contrib/stunnel.if
/usr/share/selinux/devel/include/contrib/svnserve.if
/usr/share/selinux/devel/include/contrib/swift.if
/usr/share/selinux/devel/include/contrib/swtpm.if
/usr/share/selinux/devel/include/contrib/sxid.if
/usr/share/selinux/devel/include/contrib/sysstat.if
/usr/share/selinux/devel/include/contrib/tangd.if
/usr/share/selinux/devel/include/contrib/targetd.if
/usr/share/selinux/devel/include/contrib/tcpd.if
/usr/share/selinux/devel/include/contrib/tcsd.if
/usr/share/selinux/devel/include/contrib/telepathy.if
/usr/share/selinux/devel/include/contrib/telnet.if
/usr/share/selinux/devel/include/contrib/tftp.if
/usr/share/selinux/devel/include/contrib/tgtd.if
/usr/share/selinux/devel/include/contrib/thin.if
/usr/share/selinux/devel/include/contrib/thumb.if
/usr/share/selinux/devel/include/contrib/thunderbird.if
/usr/share/selinux/devel/include/contrib/timedatex.if
/usr/share/selinux/devel/include/contrib/timidity.if
/usr/share/selinux/devel/include/contrib/tlp.if
/usr/share/selinux/devel/include/contrib/tmpreaper.if
/usr/share/selinux/devel/include/contrib/tomcat.if
/usr/share/selinux/devel/include/contrib/tor.if
/usr/share/selinux/devel/include/contrib/transproxy.if
/usr/share/selinux/devel/include/contrib/tripwire.if
/usr/share/selinux/devel/include/contrib/tuned.if
/usr/share/selinux/devel/include/contrib/tvtime.if
/usr/share/selinux/devel/include/contrib/tzdata.if
/usr/share/selinux/devel/include/contrib/ucspitcp.if
/usr/share/selinux/devel/include/contrib/ulogd.if
/usr/share/selinux/devel/include/contrib/uml.if
/usr/share/selinux/devel/include/contrib/updfstab.if
/usr/share/selinux/devel/include/contrib/uptime.if
/usr/share/selinux/devel/include/contrib/usbmodules.if
/usr/share/selinux/devel/include/contrib/usbmuxd.if
/usr/share/selinux/devel/include/contrib/userhelper.if
/usr/share/selinux/devel/include/contrib/usernetctl.if
/usr/share/selinux/devel/include/contrib/uucp.if
/usr/share/selinux/devel/include/contrib/uuidd.if
/usr/share/selinux/devel/include/contrib/uwimap.if
/usr/share/selinux/devel/include/contrib/varnishd.if
/usr/share/selinux/devel/include/contrib/vbetool.if
/usr/share/selinux/devel/include/contrib/vdagent.if
/usr/share/selinux/devel/include/contrib/vhostmd.if
/usr/share/selinux/devel/include/contrib/virt.if
/usr/share/selinux/devel/include/contrib/virt_supplementary.if
/usr/share/selinux/devel/include/contrib/vlock.if
/usr/share/selinux/devel/include/contrib/vmtools.if
/usr/share/selinux/devel/include/contrib/vmware.if
/usr/share/selinux/devel/include/contrib/vnstatd.if
/usr/share/selinux/devel/include/contrib/vpn.if
/usr/share/selinux/devel/include/contrib/w3c.if
/usr/share/selinux/devel/include/contrib/watchdog.if
/usr/share/selinux/devel/include/contrib/wdmd.if
/usr/share/selinux/devel/include/contrib/webadm.if
/usr/share/selinux/devel/include/contrib/webalizer.if
/usr/share/selinux/devel/include/contrib/wicked.if
/usr/share/selinux/devel/include/contrib/wine.if
/usr/share/selinux/devel/include/contrib/wireguard.if
/usr/share/selinux/devel/include/contrib/wireshark.if
/usr/share/selinux/devel/include/contrib/wm.if
/usr/share/selinux/devel/include/contrib/xen.if
/usr/share/selinux/devel/include/contrib/xfs.if
/usr/share/selinux/devel/include/contrib/xscreensaver.if
/usr/share/selinux/devel/include/contrib/zabbix.if
/usr/share/selinux/devel/include/contrib/zarafa.if
/usr/share/selinux/devel/include/contrib/zebra.if
/usr/share/selinux/devel/include/contrib/zoneminder.if
/usr/share/selinux/devel/include/contrib/zosremote.if
/usr/share/selinux/devel/include/global_booleans.xml
/usr/share/selinux/devel/include/global_tunables.xml
/usr/share/selinux/devel/include/kernel
/usr/share/selinux/devel/include/kernel.xml
/usr/share/selinux/devel/include/kernel/corecommands.if
/usr/share/selinux/devel/include/kernel/corenetwork.if
/usr/share/selinux/devel/include/kernel/devices.if
/usr/share/selinux/devel/include/kernel/domain.if
/usr/share/selinux/devel/include/kernel/files.if
/usr/share/selinux/devel/include/kernel/filesystem.if
/usr/share/selinux/devel/include/kernel/kernel.if
/usr/share/selinux/devel/include/kernel/mcs.if
/usr/share/selinux/devel/include/kernel/mls.if
/usr/share/selinux/devel/include/kernel/selinux.if
/usr/share/selinux/devel/include/kernel/storage.if
/usr/share/selinux/devel/include/kernel/terminal.if
/usr/share/selinux/devel/include/kernel/ubac.if
/usr/share/selinux/devel/include/kernel/unlabelednet.if
/usr/share/selinux/devel/include/roles
/usr/share/selinux/devel/include/roles.xml
/usr/share/selinux/devel/include/roles/auditadm.if
/usr/share/selinux/devel/include/roles/guest.if
/usr/share/selinux/devel/include/roles/logadm.if
/usr/share/selinux/devel/include/roles/secadm.if
/usr/share/selinux/devel/include/roles/staff.if
/usr/share/selinux/devel/include/roles/sysadm.if
/usr/share/selinux/devel/include/roles/sysadm_secadm.if
/usr/share/selinux/devel/include/roles/unconfineduser.if
/usr/share/selinux/devel/include/roles/unprivuser.if
/usr/share/selinux/devel/include/roles/xguest.if
/usr/share/selinux/devel/include/services
/usr/share/selinux/devel/include/services.xml
/usr/share/selinux/devel/include/services/postgresql.if
/usr/share/selinux/devel/include/services/ssh.if
/usr/share/selinux/devel/include/services/xserver.if
/usr/share/selinux/devel/include/support
/usr/share/selinux/devel/include/support/all_perms.spt
/usr/share/selinux/devel/include/support/divert.m4
/usr/share/selinux/devel/include/support/file_patterns.spt
/usr/share/selinux/devel/include/support/ipc_patterns.spt
/usr/share/selinux/devel/include/support/loadable_module.spt
/usr/share/selinux/devel/include/support/misc_macros.spt
/usr/share/selinux/devel/include/support/misc_patterns.spt
/usr/share/selinux/devel/include/support/mls_mcs_macros.spt
/usr/share/selinux/devel/include/support/obj_perm_sets.spt
/usr/share/selinux/devel/include/support/policy.dtd
/usr/share/selinux/devel/include/support/segenxml.py
/usr/share/selinux/devel/include/support/undivert.m4
/usr/share/selinux/devel/include/system
/usr/share/selinux/devel/include/system.xml
/usr/share/selinux/devel/include/system/application.if
/usr/share/selinux/devel/include/system/authlogin.if
/usr/share/selinux/devel/include/system/clock.if
/usr/share/selinux/devel/include/system/fstools.if
/usr/share/selinux/devel/include/system/getty.if
/usr/share/selinux/devel/include/system/hostname.if
/usr/share/selinux/devel/include/system/init.if
/usr/share/selinux/devel/include/system/ipsec.if
/usr/share/selinux/devel/include/system/iptables.if
/usr/share/selinux/devel/include/system/libraries.if
/usr/share/selinux/devel/include/system/locallogin.if
/usr/share/selinux/devel/include/system/logging.if
/usr/share/selinux/devel/include/system/lvm.if
/usr/share/selinux/devel/include/system/miscfiles.if
/usr/share/selinux/devel/include/system/modutils.if
/usr/share/selinux/devel/include/system/mount.if
/usr/share/selinux/devel/include/system/netlabel.if
/usr/share/selinux/devel/include/system/selinuxutil.if
/usr/share/selinux/devel/include/system/setrans.if
/usr/share/selinux/devel/include/system/sysnetwork.if
/usr/share/selinux/devel/include/system/systemd.if
/usr/share/selinux/devel/include/system/udev.if
/usr/share/selinux/devel/include/system/unconfined.if
/usr/share/selinux/devel/include/system/userdomain.if


Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Oct 9 00:29:14 2024