selinux-policy-3.9.7-3.fc14$>hĜ^Hֈ?o>@f?fd  ; ;AH  j  H - h1(89:C8>!,@!4B!<G!TH'I.|X0$Y00Z0X[0\\0l]7^IbJdJeJfJlJtKuQvX8 wYhx_yffCselinux-policy3.9.73.fc14SELinux policy configurationSELinux Reference Policy - modular. Based off of reference policy: Checked out revision 2.20091117Lwx86-14.phx2.fedoraproject.orgy!Fedora ProjectFedora ProjectGPLv2+Fedora ProjectSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarchif [ ! -s /etc/selinux/config ]; then # # New install so we will default to targeted policy # echo " # This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - No SELinux policy is loaded. SELINUX=enforcing # SELINUXTYPE= can take one of these two values: # targeted - Targeted processes are protected, # mls - Multi Level Security protection. SELINUXTYPE=targeted " > /etc/selinux/config ln -sf ../selinux/config /etc/sysconfig/selinux restorecon /etc/selinux/config 2> /dev/null || : else . /etc/selinux/config # if first time update booleans.local needs to be copied to sandbox [ -f /etc/selinux/${SELINUXTYPE}/booleans.local ] && mv /etc/selinux/${SELINUXTYPE}/booleans.local /etc/selinux/targeted/modules/active/ [ -f /etc/selinux/${SELINUXTYPE}/seusers ] && cp -f /etc/selinux/${SELINUXTYPE}/seusers /etc/selinux/${SELINUXTYPE}/modules/active/seusers fi exit 0if [ $1 = 0 ]; then setenforce 0 2> /dev/null if [ ! -s /etc/selinux/config ]; then echo "SELINUX=disabled" > /etc/selinux/config else sed -i 's/^SELINUX=.*/SELINUX=disabled/g' /etc/selinux/config fi fi exit 0.i* ^WZ} FP7$ ]`*JV # V~eu63 ;: TwY @;c -W /g/ W" 2 % f?$S!k }Gs ry& F\Rjx0c 5L::Et-KPcg(4zl;Y U. OI ,  e8  d 1f +:QO.r( -- t ~: >R/c K2 9 "79,5!/!`Ga (!+  /&S " o? &O<R] {z "" /n  -i/>aOx C-. [|S ?B x|bu % z($ a6 A!  J !,8GCu$ O=-  $_ o\2! +(J% ? z8~ 1v] mi5q*IIe hK - L ( YS `>~  ~ BItq TA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤ALw{LuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLuLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwe3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b85517f5c2b8367976368fe742a7b6d7342e26b3932ea7745f276464e83d1bc4baaf197099ab0e846aac230009fad255aaea880455e40d8072ef02c86548d74697e80ab364c17ca5ee4aa8708c2ba45c04dd7f7fefb73700179fb4f1d81e0d9112509b3599be5ead393c62d9d62ec9ff0df080c98e76ec604c5f6cfaab8072408285fcce8eaac0c9edf9b6ede51e0905e3b14407e039858b3ec490721b738a67eece98c3952720efba872c6541f4af73bd7131ec459fb71b0ae7af07931131215ce657c57672a704a9e3890c627fee1fdf1d5c10a3f380389c97a0f5f6e0ec724a691abf93d753ba363d07f01916b516bfae3ede24f27a7a28d189c84db9b833b86ecfa8c0e17ecee0edea965a758e1a7cc04063d21c79f66f51962209d377b839615b948202aa531e9157df4a44885fb2f27ae8a47cd74e7f5b6578212c6c943edbc882db66ed950e235d72fc14cb6328c0fc0b8e68d2bc84635c7e8f3371d37c1d4fc1f0a4f4c84c682a115659f1be5d1a2f8182d816adeb4f1595d452b821fb004937b4cd66e2a1895421b77960a954c14ee7b1f12100a262d5d7095ead6a27b10cbc0c279cd7fa37f5efa961067a3f9c731a101c2c50c081f5ef7c408088d79df2630e158171397dec8ddc3020a698b45eac52dd4c958bbf105f4e3bd0e7b4590d1aca441febd9845e56f73f41d822f01fd44892805b586896c9483ccf2dfc75816d1dbdcb41deede9d66bc738fc33307e3d671dede527951215c0b00ff1b5b81ebb04d18a2f6fd94e7f1156140f4ebdbf477c339a768a9cd28e5869528fc635b155c25c97658bc57d01d9322956beec0fef0c3e4451ee718980b285c4ea0121846bbdba1149ef9edd39c6f18d37f29e5ed9cb3670521f142ed6d7d2bf9f2b8342d2c3aa4d008aad3243fd00e4723033e27e253289356cdf2cf9ec46135a8327bceb4f36b0f077b7a232a94e214b3b0a5a85152e4d89c193f92ddaba3ede1ad69f3556eceb58ef2fc1737a99375245781f1b4ffe5d0d1cf7a2943584d2822b031b0b1779dd0091187c0a9059b02ee17a6466420c55302a36aff93ba9388b2bd727b2ee86c9e64482eef19612bdcb778b0392b5350e3d8c8ac64af6fc0be921fe7a4f92ca8144b0441ea603bfd809993a97f165eb62cbac9cb4ed2faee6a333951634a1ba0e8a692fa3bdc76fe08103e5be4c1e6a0ef6309a0d267e64389656fc66705a3ca10131fa16bcca00ef998e19357da8c56ed6be5395c839bdb5f42ac0a849284c635b345c00494ca5e94c2310fa4c0bc377f547eb039a3f3e0829cdb656e563a82adca20a02da6c562bd0a143c463b30d423c282b0063b39ebca828a21e7f33fd5e1efb61e004567a343a9f5b6685b4536f2a0dba1a666d8a0a19682cb06cb7ebb269b8c8537bb9b4b30b96120e251be3cd2e352cf2951a1334973ef6a75261ceab16db0e2c7e2e425764dc9790260c944f659a733a858695f1c187e23f2bd51c2a60cd4cc9d2ada2830d5386e9ef343b8c23953e160f363c499e97e95c27b3e940f6d2515c700656313e597db7d8966982037c66239224c2de4b8ab681c36c397ce88d64d3d9342a896fdd57ab0ea299206d99f866127c2e0ffb5cc905c22a780e0e1bed18fec6aa777cbd0e9969533401615f79cacfe402f11629b841cde8123498e059d7a1e542204a2d19181727052fc3bb9460030caa97694a30f0a902e7baca0b6027e75cb6e2235870ec07ae93a0fa35d4001c85e7967ee9ccfd13b48a701ea0d503c8ecbbfea2c9dcd2d59966cd4465177020e82abeec25fbf38fce5465682231f374128a016726e119a377decb96d7a4eacb0869c75a7c7ff54af38fb2b5fc24d837eaa621cedcb2b757e358f40cddb348ced0bf018abf5e401a8f70c11236df7992bc2e113e51b20b22a2296639fa6133b6015f802d6685815f52e941c95d7c3c57267b7794baae17c5467ae741a7e152fffc49b2929b2e5b19abf98d72da7b12c9699596c86e5ca51a841baff04f77dd411ad598eb0c563fa091c81aed17fb2b049768fcbc3af46049aecb6c19fcfa705eaccd4e8b570830cf09a9735d1e26c0d5529523f293bb048739088894584a02e9e6284566cff95dc06dace2a44c0ec29fc2eabac0b3e8c0dba9b95d0b687dcba4003b9cfaf858c12080ee34a5f7be5952379948b11f6e54945e7e8fc7d25bb6af8a8285439f6cd95fb8b1c98b5362c41d3bb7577cdac76fd4a0ce5433e3d36c83b2c26d691893cf8371330dc289df7a89223e794531d59d3b839a3bb4eb1e61877781cccdec4c7f1ca99141f183b72fadaba8b6980c23e3b35dc5d05dc7b4a02ef94cf2e26f7a90248cfb77da118077dec559bf8085451ce896553f0ba9c0fb7b0c3fc71853d2a56f5a01fe1666e4700cbc5dc1ef9f7674f1fa53a82de533f9084a762ef55562cfe9bb2aaa7a435dcc61d93a881337c4104791c762a6c197da39c61b7e976d7dc41add04243cb817aa82a7855ff5d9586e51064a30c62fc32cb9d1b7510a290236223d1d09bdd29cdbb0cb120009230d8f3fde97d6e09ac16e8acdbebe31a72477b7166a62d4bb27bfade8e8c94efaa1d005f5a7fce5d81de3d8acbac53ee2174b752ca8f38c2101b640debb78201765139939b9fdb3e2fbbf19abac5f189c7fa3da76d5831e2837fa76b2503a6e9d6cb4bd18cfa82c38adde3fdc5c42564d49471d3d2e5e65a44f3837a19c013b8728f42d5cdeaaffc7fc261fbb46c4b457e7252dfe566f45b96f98e296428f2eeb672ad5314826a0da70fd0f6ef2c43e1a31e5c28fc6dd58e6ae0b96336f881b315527d7b2b6102ef1f398a2c03fc787b5fbb1d644806c789f24413d50d71ae014c2644bf295e033baa6ee17de90c04785483a7452c1d9d6e27ba3cedd4f790f45d9c8374d945ce353f2e0e4f82405deee4fbce810c71c7fb49b73d900764bbdd2b64a6ac94f552aead7254a125dbc0410c37c4e460ed60e450a021c625db93c80990e5faba240f24830d497744b7d3c87941b0e11ee2a764374f11d474164a15ca07d66d6f4bfd62b69947a46098a00434795e2446e2cec2aad231fb044e8650527b6b7e4714147f38a1b94b96f86731474756d046db7826e13f5093a8b431011f5abc7db3b4bbd1406abb7795c11c1f5475c786e061686e8cce56e226ade70a5e9b597648cd2fb53fa6d1d3eaaef3f41e8427596566871a005a8cd3f866a96f3180bdc861247298d676c3b6ebf05385d30fd2d72d2d7d16cb25c155a242b2ad3fe640c13935b3267ce0e0b0106e789f628ef46b9d6b7c63283097bb442af80ce01c753f12e6049d0746b06d4a8a98ae2f7d6cf638862fb6d70e87008ce5351ddef58c34c2c8010874388b1ef152744eb3d8ecf30fd633eea856083db586366b90e7ef9bc585379caa4fb691a0c3214c5dbd33eac808fb19661778a9fe4bfab54a692c5ac1d80773a98b86e06e1712ff4f643faebdcabbead8504cba3e067474362db9a8fce02d79a47a9cd903c100eade0a3be6a4709a905ec9e2a3c0df5ee8aa603d88975877fde3a9b0fca63637188e8425fd50eb2d103950d974fe90435d79936a494da3ff2534d96bab69e2165bcd9d7034e9774fa3c5b57e9e5e3b926e6ece3c6756b3d7059e8cda422b65dd670b21c69af9369e45f19fe3cf177719086a6f544d4f7d4e5e54451fe000f0ab90c5784f24711c7fec2eb8221a318c747aa8f9c9dc7471f41c469ae2c7b5db712d198f42ff291a746d0fa16cb2be7a4e9e8f441414ccc26a1da36bff0ff08ed9a01cf8959d3b7ae72efcacf0f9944e5aefc93c850538d6e3c54e738e0ef46f39c365cf81251fbc223ae768641371c23ff805b0abdaa88684aae69f9596d60d6e7678d538b41b9c37c2b57659a78946d1502c10f07114baf839e4050cb13f8a16ee463b5029cbe13490cb5477125769eb875893871ba4c3fe8568cc8484618c92f94550e7e5d96d08e55c15418af38ae86de605af36208ee03731481e7e0fa3a325dbf2990ad607ce2a324f2eafedf6c9e0f9a8204c6af53c424d1f194f6a5442245c143aa09ddf7b2d9a03c7e5f63a733d9b6a470bc6ec52c1c57dd55a6fd73631648ddd020ced0fba4b4607f905fcc6fa06d46233d2613bb20990802efa798f3d2dadd25c4c279d3c9c9e62723126b5d39ab8320430bf121a7414e932a8eab90d4f5e52ce069f61d6b98986fe452c5f6aba4961cbf781d53fbfe8c5ec4225e46815b4dd125c55dd607fe357f77da1bf43e3b6ac5e66122a6023bb53988987211faec35b18bc34c016b9d67290a55f24b8b38de6e635b37e5e9b2f4baf874b8e99dc78c05a6781d4ebe3e5f4bfe979f8891c5dbe64a509a57b1bb0bfc7410c879c396d9904a00ee9c6e970f09f4406d7837b35334f7a0b65ac71788e56e0682ad74a1332caf963a9d277eb611ee1d30f21670279032a56d18ec5666ecdd10d8bc9c7d99caa0249bde2cfaaa6c54729bb4de298b0f90ca4bf3de85900b572f49b01a5dc5ddafe03ae48c48c113ee97178b1fdf5c16e0ed0d76447414aad358e7bbb7b7dcbf4d9c8286a9a14988bad5cdd0d893318c0c715446abf89a8c924e823fb7e9aef0c944f736465b541bd3d160e86d83e8852145fd8ebdbe02e8c4a888075ee1875760695afad244d3d50d42427ce0ed22c93ca0332e3b1e133f34c163eff36f3727df0d93a373844185b48fc9d9636be7c698fc465fdd8e3d0c60f8164a956122d72d11d7ccc7704d09ba05f541aaca2fb1436c29f0cfc8390ccf217d4e1ed84cee0dd3ea4b77227002a251bb600f3b68f997274887e0123e7fd1d81490c14a69d9fef071b757688ad3659f10fdbae289c6c20e65041685ece4aca98c9b6384d7431c0c831be5ad455603896a93679f1a3fed9131af6521ab313b7252596f3f73cc4d48e90572509ea5e6ba3a888fd09274629bde662a19938cf42205b6b62e7bd590472b78b75feb152d8e943d23cf62267dc5833ee751fa60d4c9f20ec79695ae2e3a1db99686219e0b6dd63680de4f39987296104f82c515d13718bad8a595d4d0e229c2d7144089a07e3f2d402dab78f76d637754fa2866e264ad8741bf16fd2bce645f149444a424e45c9f906c68adebb86768e89c67ba6f443817f04c23a9bb2af6a228b30ba9dc67ef6f5499a0e8f9c59a3c059ce3e15f65e8b1b70238d0fdd21cacc85f4f7b032cb9afe6901f3eba326db8a02343555f15c4bb19fef7d0e533e64b7326e4751fff32b3cacb35446ede72f1c755b0daa3f6eaab2b43937a95af331c6fd9feab8c410e45e45bf8281949271b78115390983a211c036c10c28392e768c2911ddd40fde177e05f412909d5067837a42ea16570a09b5146676aad0722a01e30db706e67788d558e44bd0fb600b177d88096f96dacfd78b5bbba4ffd9b5d019949d22d506f3669229c90adeaab02b0ec14d9d3ddee4bef6e06cec0c7cddf44f4cdf0560505f44db0ce21241a1d8b3f3a7881582330547e118a3aafead2b0286e340f4fa5a5b39c9b3532a08fdcedb82d180476ceb3bdbd8a19eec1836ae43aa1232a751826ca9856e8dd600411f278f937d6f3587bd22780f0ff10dd4dda0f714b0708bb0cc85d7cf9f66d64515efe814b2e9c45b69a880831190ec9bdc2dcbc33ca35666778b06252e92627eb8b533bb2785cc0e5d03f99648450ba3a7341d9dbf71893e8a401e446216e7eda2cdc05247f34594308f74ca4e0ffffffa813b11d73088de3beefad93b1b6726713bf5cc48a409c56461ce574a10822f5f387cda489e63aab5dac7abfd589c604b7d46d22c729edd10aa3c1389a647cb57fd08360ff6c7793689bca5ab375d80464ede93c9afc9d9c316f810929361152de83845f65cd1eff5e2f7682ae10c16d7839ebfa60e559da4e7015150d0e572e1d509a2b2ce58e7e3904fb32575ae4532e4ffb2cffcc15ce281af0305f1f17c6b6aa112d7905c1e192fe431a7063bebc47264d7cad12c474ee05bb4438e1b40abddec8ff2395f9b088198a5f89a76657494291d61a24de861ddfe472b03516cc884b3c3a421ff2505c90d55f5f9a5681f2b1774cb09a0465d58817d975358f54153f286e78c8cfbc76cf3e2540614252d267ac9327d13fde8abc4b2f770aadf8bd54f30d337b269fa717c3194ac4e738c858c8b6b46da6321b35db5dbb8c7600d2a52668540aca30bbfa81e99ef502986e30622b81ffce92545f5fff821eda6d9c8f6eb4ebad0d80fc45576ab4426f0b390ce9fb42312c23430d0400e041db47f0bb6ffa6f94cb5d657530783ff503e19398a7f1a7a7104dd9fca88c0e4bd53fd28a475a2c7fe3e60cb45625d784fb502693107966f43d0a6fd8380d85efa8cde8e1a3c47a082d33cbea897edf90b00820032156816c8cc1218b9cbc41108f910a9a072afb6d94c20b5daa083a8c6f1e49570a82b779b06e91e01e9b5ee5ad66e46a16a61a489e9c9cd3d91ffd2340ed15e4b868eb0ca133526d6b6fb49739c9676f11a4e28f368b804662adfb16e4551f67f26bf370f35c9a458ad8cbab43f709f3bc0f7c6e4bd1e403be7488f802d10d383103fc5834749d83bf29fb1e126c6e6d037ab11391c105db8342969d083c56297dfaa9e8985d041b64db380d0ec932399289b2ee0192192da457c456f48a51c0bc3f946581321f159370d57f812779cf9a7de0b986696520089e5215fe1c6740163e31e3ad0500277ab30bcdf71898cac7f524c3849af95f06d0ae0bc469e7503a1300b05b51b5723864f33770deec42c5c7c8d25f6d0969b865927b14cb50e8469385089f73cb948600c943ef331266d8c473d6e8749be9c9a114a69738a2b5c6bca139adf6191a5cfc9c27a162b0e6a5ac016fb2ed14c444cc841f0e0e354ceede3d7979f724b02943eed1a60e0d6bcce3bc67474e97a306417feaa020985a378f3b7d5054fe5886ca3060011793437c7363076420f9897184c0519fd9bb789a8cb2f8af1a108128b1ab55a04b6b9699e3bf01bc08c92ab807f1d32e74a340b7154f4c1c364f4e645a1688765392391a2f62ebe22a1353e4462a60a90a28f6c70697e5193b9ec92f7e723a7cec5d0ebb2f447cbd694ac1ae738765722a73df1036e450d60bf0921096fb34a559ca0ee763ace30cd4a72ec0c7bcfdb99f96a9b1c9be7a72e08c31711f29e9e512f2c380af3c8a6f592b99eace1d733a669e5c5d304358ca00acef525db3c3c8d128080ebc2524db7e56a515e1a26f031cc209be849daaaa176dfc896526d2b6f2a64b976886faa3bdc8308949c4d765c728bbcd5636c9efdd8e1cc47b01bfe6fc1fb431657959a6fcea8019b9b37ae358cc2b1e42eca2d3c0b73ad921a7c3e9219ce8721ad448486d56db26b0c1811038d1b30908c9af2b9a72a130c84252fff0e30f7475b46a4ba35b9189c0c12d51262c5c2f930159a5d11cd4ad9802fd6892251744473088a1cc2cf581e2ea7d9122f9e3bc6c06792d83885011eafa1e9b36d6af11aadfec3f0ca8da4cb301adb619ac338d4ef82d860e98166b0978b1e32de3627af6ef9577801a17fca4669de41084c498af21b078930a6b30ce410b6f4e11d90d93075c820fce88ba2a17ee60b125753133dc9c5cd8b5b9e29f6994e3bc284891d1b4a1716c511e24f0ad907b49165e62ead29556b36ce994c982844c884db4cc3e8907f8799a89ed4a2f519e7416e4af5597164defc10e8583db4791025d4d3f0893cae53d0ee29569290f29b0f73b691f05895c9a2c40359a873644e29dde4c4212a744d27c8dd7d63cd847c493a013583b8bd2b0ff6bcc33ddd398be49c8484b49ebf821efa55cf6ebdc8ca8964ed6df9f62849b36e197c53edf923b0d59e7602ded8436f06fb7135d3c406758af82771271d3d7052b25dc934274689c34ad2896f3cf4f246996f644540c7f689d61d890383356f450e02268772b4bd59b29a1057377b5246c51494c3d65cd9be7cdd44e77d262cbe0f7dd346bd3940a1837127b4d96c1adc81a9b2853da5cacb838e6d7222bb68ce1515a84a511ac79323b29dc347b9af3a5f4722948af8ab048269515e73a270d052b8ff409cea698328c5a4cc65e5891f04e967dd4c4a0ffcf4ff8995d4432d218dd1237a6ef781ffd465d6affb052269fc9bd1982f5ca23df3a8614eda174ed02d60226559cd1e6a685e2801ce3bef7b73f4577f7e49482e608900cfdf487f606f9d4e3caa2bf165b91a4df095a8727b3e5ee63cb79b19a95c9de60a60fb3603e10ed4cf9ac7b5d5ac69b0ab822a664f31ef0b4dcfaf8ce337aa2a80df26f37ac5bff491ac1842f40f10eacde168aec22d2d14732daa332ab4a4c30248538e83dd78cfc3c58192b576d35b47461fd189c7ce2f2bb28fd8de366377909eca909e76f834e82aa719a3b2a90d3a35ca87b5dca5c862e4fe306d2a6df4bb14a145edb953136de18062395e4f5eb0d6d134bd805be3dc289ca36aa33bc34832871fbf11d923b56e5f3a7370eaa6dde6d978e89f788d512a80fc498c33ff338ec7f0c3c60d5efac27e0d1225d95496a029946c921c01c62c9f29f29cf2a3ebe6afe0b14a0c82fdebf33c6526f216718e4086fd1d866adda37b87dce42d2e8a9b194fcad32a2259ac21fb3103fce34d60bd776042c76060489ef60fe0eb409adad76d0ad173f195b36b81856bf5dd984b8d7c83c75c4be73664632342a017ef206f0ba8295845792837d250f374ca2370df409f17a404b26687bcb2e6018351e99093d74f5b539048a68a0f34915947c3a8a445ac9faa1508abad2d7ff0f3c35690bdc85da76bb9f59c22a7186659791f24ea5aa27ff0350e301a756fec499d85eb9faf9d2d1fadbc909229c3f7d6f131537b789cfc5839c3c18364f16a317c8a1a5f4b07f0eb299e842065476b20109e556a3c6364a2bf6fdb357180570c3dbc8a9d179e0e903c6c746dac776d84a90880c104829d2a8149d40393be5be95927468c9781a7f1c3d641dd0a35225f6d94442f580c15c13eadd4e6df86448837bb414ce73a82b3632cb8ba51b33e29aaccb731cf9d2cce707c06a1675ddd8befaf7f5414ade41adb5bd85748f870b0eedaa7f17fcc079d44bf04ff571ccd07bff654978ee799c81a105f1d9001e6fa62462ce64314b72729923a678b25befeb3489fdfc2fd4d2df8ccbf46a20b7b00e1df021aac1391f8c634365a8d7d1c17c1259ca41af3593e87ebf25c6077714552049986a9a00975d4ee08eae6ba290cf118672f92d90a5b5a2c3482096c1d9bf275edc123cd16c17c8d99280c30e35c37f71ab990bb89f443d3bb9c56120ab2e8713a195b867fa5119d811baa5a908c6738edf6ae95524a901ddf3a302c029692fc931368e7acc83f71223346183b2982d0cccc2ca5c48167934ded6f731b5478ebc07b1c93cdf0e687c5a6b77dc8e69dbf43f15875897501febf6a6fadd3e83a4ce1fbed3c11f316aaced4152ff6363d27e42063de6abeaeaec56e4cbca87f7c1c7243914cd98500235f93347a0a295425a80a8993ec56054c500d020e7b42b8a28e1386bd6454eb168722b1f5b291beef72a3c5498ecbe9966b5e0ad5268f47bfbe49efa68c2aa381d4925c98a60f124c749b5918e3d626dd4be09e2b048d9ec8858a81fbcbf05b2e82a57d17747e8476d0d5913256d5aff62ae3d39d899f3c2ea7aa68a398cf3c77f63f079bf0314ae80d3d6a9837405f9a0bbcb2fc5e70461607c25c9224b8c73be6f1ee737cd47df3dc4d5eb8707621ce08ee5421e74da75fed5eb0c36720ac7bf257418746f2b2c0c9be338ced4000ed602d57198486925969c6fb31926ec834e88cfb98ee5b84e40c520ab589464f1416101e5609ec239d30213cad3bc3686f46944dd0cfd9dce0f34e7dcd4ee9176b664cb0744e5b429839ca0c7fbd9453fe16d0af7e40fd83ac2d93cb41251b29ad18848bc410dab95c956ddf862ff969b1ba88dcb54a106911dab60418d386bde15d654a0957b42f5b78453de82337b00544ce62b56df4abd4f51c2cc106b22f46a35a87a53d88a88aa726c2d70eb3d6accdc4e9323b3ecfbe5df5cd40ecf98f0f2bab758d540be041fb8457cb9db603cfc38da30a02fcef424bee76c976182131ccf53d58ee0838a64cb0fcd546593ac7563315046f1343763fe4bcb2534d616dd007ce891b639609abcb9da739bb1140228b2164b9ee8d897e625e374c65a542f05a881225d6ad7c0a02813865543536462c92008b8a487a239a00a6003feca90f15564a02811910957dbdd3d173640f29638cfae8fef1ea7598ef9afd3843c18ee1c98ad2e20b7d9073c34df8a776049256fec3d7e44eeacaa64d4a88821733b83ba0a3dd1755d67b2697ec1be27abbe73b022f2b147d979b4a65f9ad1376500960244acdd71208c749cbdd73ed79c9dbba2b0196484da65302d030317ec46cc9aff70380278eb77abbe11676268552278c9fa74ca61bab563cd2e2ad92ad36e626ddc463bd3cb33ebd9efdf0bc4eaf08e9b44167455f16ac94d4a4adad1cf0abad28fbdb5dfc94dbf9e14d15756b1a18f38e01fb63a53c4d4d38f15a3298b03abf6f5104389d5f6f73dea8a7a220f7de8e64704e8b7e920612dcd8e89beb3ee425f2b1fa3b1a9290e5aaa577a34eb9d6cc0230da1a80facbb01a85a255835c207b8782d0deb25b6adcf7bb85d2100030e533e99306cbf96c0060158fae2946dec4ee0e6e8938f21081bed69bdc3ce35fd2479604ff770e5fc49dd7957f13b073a2485a619bf6013d6fe497cb42bf644b5f6aadae6a3d6546ebebdc7850cf3831565124973710580eed4bc9ed0069a35418f44c50afe9ee6d5847cb75c8b157fc405e7467ec47a9e860a6b03dd290d33643c612d33b0f793d7c580b9bf76f297f7cd23563dad90a32876b5bbcdb26cd9c68b41dbc704b7992dc7b661d304f6a207900a2ff189819d9484ec18e70d165546c7390f0179c0a9a1384e52889dad228fd027f8f83af4b101e87ff7a9503518407d9d0ba906a9acbcda03bf8921451183e655705d3dff0c3eb36feaaafd12f9e20d12aa6ea63cd8d0756309d8d454969c550422d29261d6e5fad2e93101784b5a9801a9cca2d47d141292812dd48843c29584e5bd46d5b37c224b1d7568d286f0afeb66811209c234e890067af92d422fa49e1f900a2681d7ecd9830d2d2bff825ded82b280a303ebebb52e658eab9fe315de18473e7e1bee72e494c111856174a348a1d1b5904b7907e3610e27e9d703bd5d1f7545f0147f1c982f153533a6aa866c2707cb117eb47ad800f5b6fc6731767c471d009a3631b4bac25cac7393533d641d90dead0bff3f07e0266bc085ef48a74dfc83ad0a6d2c17862064b092e73e99b3e40b68a4d022b6f74d296cd7e2f40f8e3e980aed0edef7194df60f5a6c6a8c46a1fab2c5e85fea1336df4baf0b42f5293af031bb4725f7f91a5dcb71465ec0050ffaef499a8349781908fb3e9cd9c0dcabaf6bd925d6cb52c19b82d4fbeadfbb8ce1925a94ff5dad3671bb82116cdd5d845212668eaef57f5473e21ca8c6480bfa252364f4171567b63cdf51c3f6067f5cff8741f6c5dd6797366fbd3f586bd487b1ee0fd241262fa98f4049c389f0352a4a600ad5e6eb59a54553fcc4774ffde57933f6b773517da1874a5e9bb9b0daa79fde5015ac3df3619af2eb480f3c1f5186be323972a67c4c9a0a0c6ca6b5a97b417e4a726d91fb82f3a97b4e7ad9629fdd3664a38f1f046fdf075ba7ee233c4d8d77d47d47656abd65870579e62de7c1875605bcf496f2fdb6c98fcbf69bdd414f6628fbb132b2ff000ac1f53433f21fe735b97650f1e208dda8515976678bc285f4ea4d57cc569ca74be8ade16fb2751ba12eeea246a13a49a59914a402183884910e3cc9774010d00a966eccdeea64934d077aac6f6033af87d195c9ee68b2e0cf3c9c4b1a7907251e8e58bda9c25ff056a1ca3691d6de2d1fb40ea09053763419da00ed6a188e3662399c64a9f018dda6e7a94b0ea9f7580a69a112110dabd28890fa6fe8704cfda204aedc1d287d31cfc9f4557be3f9ff404038993081fabf63ae0e0aabbe2a087522ecb852f3f059aee9adcd5d1ffc4547b09ea9cca5d34116cbaf582665ed05541e85041ee5e95a78af2b07b853d606d604c3431d364e157c5e1da9334f7f089d0e52044f59b9525c0d9d15a548fc1306c641c4eb77abfea3d1582f6d054296b108502cba7ea25a40d0f2973ea157047aaba0a2b23e956c55094d80818b75989793e3b16707136be9579e0c60cb2e74df78975e59b0deb263584fdf278577398ff1a5f4f1a9d2839ba1a2da6351d8dc8fc7031a7f5be8e32920a1829fc18b967c819e63b3b5f65428816aaf76cee92d4b761adab99d783d9590a8d22d87e11cdf1fb67fa26a97f4e11c4d784f5c08d48d07216f891d79922ab1bb9e770687ed1aa0a6fb3a464099cc95f4a3f95e2739387d84b25f817ca2a0c5da925b8c47557b7f9ca9a54dd8d273f16f277902bc83d5ea57c202bf7766b19104cf177953a8fd25f1803d7371a183eedf3f74f8115d70ca41c3949dc3873c453d5947887cd3d948381aed37d7d733320b759cffd5cf653fdf4b96c4ee3f8d5acbcdff7d49c5af6bea3eaa3e54ee9560543a4b94bac421041c78fa0c6246243d0a50ca3794917d01f11b0cdc4a38c70fd931d5ce69a9c42894ec06d59bed3785eed93849c2834e943f81951010d7ee20123badf2c7cd2f493eb05766b80c96ac81fd4ba6dae1b0f3b54e0b6c7f539120c434aa0284b8ee8390ef50dcfba124422e531615c4365e83942463f7d73820a9b6b2c1896f9979c6ed8c0bbf24cd29d7923e2ac7da8d931db5b6704eb11705f241c63a0a6e2a33fa1d51b859a6c2f3c8b3968dc00cb91ff9b96c2422c9bdc465b58996eb268c92b9b98b226392aa7305f3eb6ffc192cd6f994ce8b1b2c128115dc26fc802c5baa1e214526297cf14b7c8c4b7735e9d6c05dabbab4df205c54961c71b8f8f16812af0407bd44b22fa8ef0647b93e5c3f3b9f13c2eef4b7314a5a30226cca3db7fb3c7bddaa8e2eb23fe83aa4960a502ac4df91f572ee6b366bc50122e4268c2856f9b509c738090998c0b6cbb0a0446b0910807c86e6218db21e55648085363973b984b231667923eda58487522bbcba1c7c8ea56f1b83180521a81e8b371827c84f58dc10b9fa609ace6a02ffd702aba018c431aa27a06ba463a7851cab5fd120741e01f85f1a72c40c3e72c43c81cbc4286db648c8c42cac7ddb2cb31a3958c2fe4bebc839e7db75631660e3bb8e747008ad9224300e85f19fd6f7cfe14827af2f94f7b17e0e2d862933f206abbfc8290d7a30e27b90281620bc18b918dffa3544252dc4f7725da1714ff7b09609702b294dae416d72342a4f829a233eb44fd03996abf12d77dc50ff6e521b362a041f3d7c5f95dc09bcb30cab028a2ae158f447ed825d82e576648fa59ad5f42f908752a256aac49f5bdad206fd97d5db26ef9c2e48c402cbdc99c46f94dd44cb4fe3bbf4b85d1f7b2581d6558fb4bdd986a75f66cb4b3b318afbd1e2c0972fafabfdca93ba24f73c89733c9534d7e5e0ccf53295f6c42e549b9488f9e08a7238005016ad9a2a17dfa1660f2e8272abf87727028d295bc7817df12c0c4f78f6a5559430c3e2836a183f6b11768b7577538c06de97d6895f8b32e727f3b3d8b01f0ea1602a179249cda9c15a5cee9119e85a9f519ec28427b47a3a8a0b92dac1276436acbb54bac573e9b83af6955baa986df0081836d04a9212ece4f940ab65e8fe0293dda411468e3eeb0f6ad87a3da2776249b9619a6cb8ffee9590b8c93fb39092d2d86eb4745ebc9aed9b95b33afcf0593d6da3361355fadbbb46316f03e0f32f92e01e679b60a5176604b55fee70d85659e94aa9faf3b4d1e4b0a0bb1554088f35f4f7a9cde170534dd885326759db643b073988cdb38e37fb3e081dfd094577c03a0bf25db4f43278357ac871aad4dabb76072ce6ae8beaf03e48c627465dda54afd436d47f007c5b1c7b52cfdb56650f5629283c09dfe2103104e88bfae8726f9e6f4d8a939e708c549a15d0e3bb83e5099953f4098ab36138c17adc824fc83d78b1bea88cbb727cc7789d55e264b32f0065ac0f4daf5880234dce9104d00d0abe4c666a3891f66992164b00a8a61088069dd908814203d20f8ead42de7db072aa87fcd7a20c159d9eb662f11073b17d2dcc12b0859cf41f7409637735d9ce56bbb07ccfcdd01de2e62fdbaf7e26b4566f43ed34db214247bf6a0eeac5371a763a9bf2f843783cf3c4047c68df14d7f94c8608c47a9258da6d4e58aa5b2af3a6e09801f54e7a550c7b0cdd5f905f583e6174f938218c5c3ec3522cf2def3fe7378b6ec3932ab530fd96f7f63f601565e842349fd473294580690d7a56fed44ff335a573de53a0d3c2e4908233be5b83d7e45d5b61daff04ae8d3eb9ac210ce45fc61615476f956974cf320374d284834315217c7acf46e03dcbd6a6c39982eef84f0c628308890a96f305f7c6e32ab7ed51c97b008db6e9be98c7b4581e16579e8540a1752d8fdd44c6db788641177755d77273a0e0ab90416e06351248d699835509ced6c2a692d34409d3be4a0d55de22b8ae97ed3bef33d009dccfba3c7e77c1156fe02df71a48c3e29afd9e6e43c8848d5ec133e47a9aa5bc6f49295e63884fcb22e77fc54e4941241b8008574204bc95fc776ee0b5430d489cf1471bb18787a44fa028823e7fab0c7cba6c76dc9f56050736867d4f3495720afb4762186179112ff66fd065f13798f0b42e74f61ed551ac6f09c2d83f5ffb264306bd8af66ceb8d12de844448a08765f8ab90e33c15084109ff5b11c91acd6bf1a2156d877da5cbd5d2c4110782fe34b5dd329c73defad2efb77f6d5b529d3e06858bbc77c2f1f3ef30efb853b8e0c13852712435f73650036ef8c24efc16b6ec0c49f56d987f906ae38f3a8685f6118c5d624b836f93fecae6d5c46310a2180fd8585ada78650760c9e2264742c63a81e45ee1dbfae62fa017d005e9756e15cae3fa1760527b6be976501d010933d7b57f5242275e80fa937ba98c9f5de59fc85ef3efe75d17947536afe79f34eff9209d5049b0b6d1b776c20b14bd083a5162ada8e045cba43d54286485dc33b97a0ed4869e92073bd85f126afa4ab56b8e16b2524e1f6fec44484668892fcd2e1b2a8fc408148f4ae74296574fdcb92b8d343a019dbb748100bc63156feb5e6ad8abbb342c91fbc4ec5a94fbd6ee3e8f668aa9c67a33f0082776e4567e295887a7a6c080b52ccdf0466f2213273cce55e71cd76810aa1b44cbf4c2469698514913f77c9c882ab25d528695ca2bbd915369b8e7f105f8ca9b377608fa5571bbbaa19194f844a5226b427b00c09e3f361ffd26dbd16e687d9ad6de1d35c01e7ed3c39d2bbb1ac9fb912ed5f5556c089e430e6d72b2db556bc96cf79b83396c3308afe57504e76b743958966133627667e210c4cadf08abadcb59ba08b3d169d06024a20d0ed09c2624003973ba95b69a361706d873f368c5fc9f13e9c9def934f3fd7d81fbaa90f085f2f3004cd299030797fe0cde62ea393fd11437b07e800e2f8980cf824777d74b9cdb6a68c88da7f36380ca40ce0e75c746d8e9f20346b92e4e9bee2a530b208b1602e1aa249f18f61b98b1557b63841e2f9675f7311c71153a6265aa317df2127c3a3074a2d91ac976be7e9f8803e87bd0dc9a139c949e0356b2deccade95914217b563ca1583e1a0ad9100e3894eda551109a2c4111feea740b0d75130e28b570ecb2d601e38ac422314cfc08097856156649f3020c6ee1be1367182719f87d5c1fa98841ba81972721da6253c734b64aa4af4e43fa1f373214090734bce98435e877a5039ecab60b9d9a3123e23f03f4eb91912a62035851fb628206b28d93b70f6fe7f224aa7db99da4df17d7c7a4a744ec7a22464871ec54836da59a2ded0f99ddac52472c59bd673b0025d3e8ce8b0fd27bce3b899ba1ddda3c5b19a7fb4e77db04fe30b377db5adb839b199c24ff90fb79d1165756f827bec556dc7f7e963a37a873e0b49a7c6039f0e96889c94644783606cf92a8ae6cb35d6405207d57ffd09e57d34c4be17d7836acc8cae2b039ec1bc6d039f13a4bc0d8ec895e2555ac44d5486287d94afd77ef25908fffc8b13780f6c632a155858d33a13e5d998b5cec54b5968271a32ce79f80118678f2978011bbaa86de2c560184bbc3550579920d3c8a796a74bc5541962fb852cb53d4793fe8a505453f6bff7fc98215044eff87f28e65559c9b030a0676eac25552b5961084f162e8bb61637c6dadb97d0c910360597314d5811136001457de3de7850137a00ec9d38d3639d4386a74fa9cc6d51f858627d6aa5cb17b019f79584e45f014c5148bd187dfc6a7a179e857669148d4192613e7464618c39257f227c443b7fec00d696c3664a93ad18003cb35a752e91df73a688cd65b92b754071ce3f6328f76c6d6f455e2d5b8b44893b51bf234c1a64f79187ea7b59b96678ded0adbedd4b89e8e75728b70c4fd455fbd6649d36f54adb32a85ed69d81552ddf2e2878f85120b57279c65560172f9c670973e1a8dc0c8effd74072e2789dd6f858f0dd7bc4b783dd84198127d7a59782614378d2b89ea5432783bbfd4509ba6e64426eb643f425454bf78127d7a59782614378d2b89ea5432783bbfd4509ba6e64426eb643f425454bf73edab1ff7eb6bf33f108e9ac1a08eb16c954b88a844e3119adf5950b44014eb69689253c414a4644444289eb282df72b022140aebbca7e749edf9252092458a582ac5ec0dd2a32959be2910a8db23ec2ddceee0702a338969c2ef54b49655d0226843b75194ba13fd24265e1b2a0323452ac2b5bac2adde9b87f80e7eccc769e47d28cb4dbdc2a04215854ecfeb53885a6e23af3b9f8a36b5e3b0321cdce888a3fddea80b320b85ddee06b588b1277399d23bf53d114fd9517ac2c9858396ce1dd6c77f9b53773a6d4a14679151e97ba2ccfa492d8d2edef56715e985e1f7c23e1fdec28537b8e222a841f8e7915b5e8b1e729234ed896c1cb0e14fd775dbc3441e15040e0e9f3b19febb4a99d31b38f2c4e5e1644683c2e4f6e283423a37e88b52f5d46c1b6c97c0d09b498314bf24789ee87d3938c4e5f3814248da88d075320e9fdfb445620cf0c4687dc8eaab144a2c0a5743670e5cdb2a291d3f84b51febadafa682a7a658b954abfe0738cea9b561cae31660954aeba20c826125031856d0550263028e68e3fe3ce562af2ee4cd6bf18572d196dca115918e42c8c526cf263dfb1036f1fc4d2d62b99243e8d13da0a7b1076b391dc3fcb4c11d901880f911c735c6c0b3cb87a9e03e78aa684092c7d81ac454e5ee08b7e996a84b12892196a3856c44ae4b6e018f3f0b4a48005d8eab3606e233cf1da52b94cfe05f986a074ab02dd17869a1442e5ad002d183809d7cf599310b94490cf9e3000285514ad684524ddaf0370d374ced8130739978f6eab6d60c621d1fe656494bd2ea619ef9b4ec79e2191d40c004b3a7937c87804b902567ddd59581e3fe1176e6e5e0f52a0efd9704b4921926e3ecfd01bbc7d025c2932dda8f8943894aaa441ee5aceac66761f74af6a718e1a293fb84994b89b198d821961de32378bfba75f35da3052eca07ced3e4f35417c099156e461d57667010b40c3c25511f58613c04b4b2754a4e74dfb2af63dad0b61ff21f4f95994201c284fe8f586948c544ff57e966e48ee5cd8a2f48ec422f4bde4aa06dd224d1f2f5f2691e9b2df90532b301afed839305700e931c9d45af22a1aacfcd2cfa6ca9b33041bfaa20627fc053ac9832c0c03c6385afed74187dda34322582cdb48144b1a1de6f4d23110d1b5bd4132ce7634377a44abc935774bc091d0af7baf584d973f4bde8c4cc8e8c5c8dca17b3c7ceb499e9d3ae9c94668d9369c850445e758eddc5a38fae86953bd19678ff6a328aa2c5470cad0fa9f2ecdaba7e2d1c74ae44cb6c5190db8466c56edddefe54d05576c4f550c232ec4a1203e1c9c943c3778043b31a08c6318cc6264fba2798c48a87e68b9fc139c37b224b1de9b6c784a68ad18c7c78667664999fffe7b168ca468dd57dcbfa30c3df89e492cd45a0376e0bd746c5dfbcb8d2c2a07017c4f0cc1a834a9d9135b1613fd22cde66e7b218b0e57d0c881fa52fa3575b63de3ae96b70c4fd455fbd6649d36f54adb32a85ed69d81552ddf2e2878f85120b57279c643aa4a586f3caf87a9e35809ca5524db67e2ac058c8c305592ab6b23287a3098cb5ec5471709da1e4f7c5184483008fe19bad75fd6b07c89382b96e39d9919d0Q@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.9.7-3.fc14.src.rpmconfig(selinux-policy)selinux-policy-develselinux-policy@         /bin/awk/bin/mktemp/bin/sh/bin/sh/bin/sh/usr/bin/bunzip2checkpolicyconfig(selinux-policy)libsemanagem4policycoreutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(VersionedDependencies)rpmlib(PayloadIsXz)2.0.21-13.9.7-3.fc142.0.14-32.0.78-13.0.4-14.6.0-14.0.4-14.0-13.0.3-15.2-14.8.1LB@LB@L@LMLL@LdLL{L*@L@L5LLA@L@LLL@LcLzLzLzLzL)@L|L|L{@L{@LvW@LvW@Ls@Ls@LrbLrbLk@LjyLjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@K@K@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@K@KqKqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@K`*K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@JjJjJjJ@Jv@Jv@Jv@Jv@J$J$JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJf@Jd\@J\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@J@J@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@I@@I@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIm@Im@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3IIIIIIII IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@H@H}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HQHQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D+@D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CR@CR@CR@CR@CR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C@C[C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@C@CqC @C @C @C @C @CCC}@C7@C7@C7@CBCBCYCCCC}@CqCqDan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-3Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals-- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version/bin/sh/bin/shselinux-policy-devel                                                                                                                                                                                                                                                                                                                                                                                                                                     2 t2 y2 z2 2 2 2 2 2 2 2 2 2 2 &2 2 "2 #2 2 2 2 2 {2 22222222222222222222222222222222222222222222222222222222222222222 2 2 2 2 2222222222222222222 2!2"2#2$2%2&2'2(2)2*2+2,2-2.2/20222222222222 2 2 2 2 222222222222222221222232425262728292:2;2<2=2>2?2@2A2B2C2D2E2F2G2H2I2J2K2L2M2N2O2P2Q2R2S2T2U2V2W2X2Y2Z2[2\2]2^2_2`2a2b2c2d2e2f2g2h2i2j2k2l2m2n2o2p2q2r2s2t2u2v2w2x2y2z2{2|2}2~222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222 (2 (222222222222222222222222222222222222223.9.7-3.fc143.9.7-3.fc143.9.7-3.fc14 3.9.7-3.fc14     selinuxconfigselinuxftpd_selinux.8.gzgit_selinux.8.gzhttpd_selinux.8.gzkerberos_selinux.8.gznamed_selinux.8.gznfs_selinux.8.gznis_selinux.8.gzrsync_selinux.8.gzsamba_selinux.8.gzypbind_selinux.8.gzftpd_selinux.8.gzhttpd_selinux.8.gzkerberos_selinux.8.gznamed_selinux.8.gznfs_selinux.8.gzrsync_selinux.8.gzsamba_selinux.8.gzypbind_selinux.8.gzselinuxdevelMakefileexample.fcexample.ifexample.teincludeMakefileadminadmin.xmlacct.ifalsa.ifamanda.ifamtu.ifanaconda.ifapt.ifbackup.ifbootloader.ifbrctl.ifcertwatch.ifconsoletype.ifddcprobe.ifdmesg.ifdmidecode.ifdpkg.iffirstboot.ifkismet.ifkudzu.iflogrotate.iflogwatch.ifmcelog.ifmrtg.ifncftool.ifnetutils.ifportage.ifprelink.ifquota.ifreadahead.ifrpm.ifsectoolm.ifshorewall.ifshutdown.ifsmoltclient.ifsu.ifsudo.ifsxid.iftmpreaper.iftripwire.iftzdata.ifupdfstab.ifusbmodules.ifusermanage.ifvbetool.ifvpn.ifappsapps.xmlada.ifauthbind.ifawstats.ifcalamaris.ifcdrecord.ifchrome.ifcpufreqselector.ifevolution.ifexecmem.iffirewallgui.ifgames.ifgift.ifgitosis.ifgnome.ifgpg.ifirc.ifjava.ifkdumpgui.iflivecd.ifloadkeys.iflockdev.ifmediawiki.ifmono.ifmozilla.ifmplayer.ifnsplugin.ifopenoffice.ifpodsleuth.ifptchown.ifpulseaudio.ifqemu.ifrssh.ifsambagui.ifsandbox.ifscreen.ifseunshare.ifslocate.iftelepathy.ifthunderbird.iftvtime.ifuml.ifuserhelper.ifusernetctl.ifvmware.ifwebalizer.ifwine.ifwireshark.ifwm.ifxscreensaver.ifyam.ifbuild.confglobal_booleans.xmlglobal_tunables.xmlkernelkernel.xmlcorecommands.ifcorenetwork.ifdevices.ifdomain.iffiles.iffilesystem.ifkernel.ifmcs.ifmls.ifselinux.ifstorage.ifterminal.ifubac.ifrolemaprolesroles.xmlauditadm.ifdbadm.ifguest.iflogadm.ifsecadm.ifstaff.ifsysadm.ifunconfineduser.ifunprivuser.ifwebadm.ifxguest.ifservicesservices.xmlabrt.ifaccountsd.ifafs.ifaiccu.ifaide.ifaisexec.ifajaxterm.ifamavis.ifapache.ifapcupsd.ifapm.ifarpwatch.ifasterisk.ifaudioentropy.ifautomount.ifavahi.ifbind.ifbitlbee.ifbluetooth.ifboinc.ifbugzilla.ifcachefilesd.ifcanna.ifccs.ifcertmaster.ifcertmonger.ifcgroup.ifchronyd.ifcipe.ifclamav.ifclockspeed.ifclogd.ifcmirrord.ifcobbler.ifcomsat.ifconsolekit.ifcorosync.ifcourier.ifcpucontrol.ifcron.ifcups.ifcvs.ifcyphesis.ifcyrus.ifdante.ifdbskk.ifdbus.ifdcc.ifddclient.ifdenyhosts.ifdevicekit.ifdhcp.ifdictd.ifdistcc.ifdjbdns.ifdkim.ifdnsmasq.ifdovecot.ifexim.iffail2ban.iffetchmail.iffinger.iffprintd.ifftp.ifgatekeeper.ifgit.ifgnomeclock.ifgpm.ifgpsd.ifhadoop.ifhal.ifhddtemp.ifhowl.ifi18n_input.ificecast.ififplugd.ifimaze.ifinetd.ifinn.ifircd.ifirqbalance.ifjabber.ifkerberos.ifkerneloops.ifksmtuned.ifktalk.ifldap.iflikewise.iflircd.iflpd.ifmailman.ifmemcached.ifmilter.ifmock.ifmodemmanager.ifmojomojo.ifmonop.ifmpd.ifmta.ifmunin.ifmysql.ifnagios.ifnessus.ifnetworkmanager.ifnis.ifnscd.ifnsd.ifnslcd.ifntop.ifntp.ifnut.ifnx.ifoav.ifoddjob.ifoident.ifopenca.ifopenct.ifopenvpn.ifpads.ifpassenger.ifpcscd.ifpegasus.ifperdition.ifpingd.ifpiranha.ifplymouthd.ifpolicykit.ifportmap.ifportreserve.ifportslave.ifpostfix.ifpostfixpolicyd.ifpostgresql.ifpostgrey.ifppp.ifprelude.ifprivoxy.ifprocmail.ifpsad.ifpublicfile.ifpuppet.ifpxe.ifpyicqt.ifpyzor.ifqmail.ifqpidd.ifradius.ifradvd.ifrazor.ifrdisc.ifremotelogin.ifresmgr.ifrgmanager.ifrhcs.ifrhgb.ifricci.ifrlogin.ifroundup.ifrpc.ifrpcbind.ifrshd.ifrsync.ifrtkit.ifrwho.ifsamba.ifsasl.ifsendmail.ifsetroubleshoot.ifslrnpull.ifsmartmon.ifsmokeping.ifsnmp.ifsnort.ifsoundserver.ifspamassassin.ifspeedtouch.ifsquid.ifssh.ifsssd.ifstunnel.ifsysstat.iftcpd.iftelnet.iftftp.iftgtd.iftimidity.iftor.iftransproxy.iftuned.ifucspitcp.ifulogd.ifuptime.ifusbmuxd.ifuucp.ifuwimap.ifvarnishd.ifvhostmd.ifvirt.ifvnstatd.ifw3c.ifwatchdog.ifxfs.ifxprint.ifxserver.ifzabbix.ifzarafa.ifzebra.ifzosremote.ifsupportall_perms.sptdivert.m4file_patterns.sptipc_patterns.sptloadable_module.sptmisc_macros.sptmisc_patterns.sptmls_mcs_macros.sptobj_perm_sets.sptpolicy.dtdsegenxml.pysegenxml.pycsegenxml.pyoundivert.m4systemsystem.xmlapplication.ifauthlogin.ifclock.ifdaemontools.iffstools.ifgetty.ifhostname.ifhotplug.ifinit.ifipsec.ifiptables.ifiscsi.ifkdump.iflibraries.iflocallogin.iflogging.iflvm.ifmiscfiles.ifmodutils.ifmount.ifnetlabel.ifpcmcia.ifraid.ifselinuxutil.ifsetrans.ifsosreport.ifsysnetwork.ifudev.ifunconfined.ifuserdomain.ifxen.ifpolicy.dtdpolicy.xmlpolicygentoolpackages/etc//etc/selinux//etc/sysconfig//usr/share/man/man8//usr/share/man/ru/man8//usr/share//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/admin//usr/share/selinux/devel/include/apps//usr/share/selinux/devel/include/kernel//usr/share/selinux/devel/include/roles//usr/share/selinux/devel/include/services//usr/share/selinux/devel/include/support//usr/share/selinux/devel/include/system/-O2drpmxz2noarch-redhat-linux-gnu  ASCII textASCII text, with no line terminatorsASCII text, with very long linesPOSIX shell script text executableXML document texta /usr/bin/python script text executabledirectoryemptypython 2.7 byte-compiledtroff or preprocessor input text (gzip compressed data, from Unix, max compression)R?7zXZ !PH6V]"k%{d<#@cqj{1soOGƄP~]#񹉇E9_#^2zt@)[ҝQ7&*/ v;,^'cfEqllUϘz®+֮_}AY:;l*ÕvY&Ri< ]P9 n:(CC& Yo">ǴygĔ C5Tl@ȖmGJQD%cF[Ǿ;~M{Ѫsw"?+&dI.T7Y2v BKxFO K3]6_@/J "m}[0t}uy ,W)|5s8`X؁m#lT8飩,uc[[f>f9FcMg;dFl'WEJSOY'DTh,GiOІͮFPRR(pQ\" #fT ,'Tht'xOp7)XbwJ/c>qL6ጥt}zyQ{jGv ?3{@BNHMEy=[rL|V? W$ܰac-r&$5 azeJikE:f`í~܁ѳIas@~Ùi~TRwܘӶ ='{hJ/^@G ^rbЌl{>OD>`tT|*$ ](;_6~{MY!1ݹ4N Ce&: ݭ##"}qylTq($cB `+Io>/ Ƹ^%]^Qƛ0sNH Z?V1Dw7P"]@WFfa ܟmRn6V_@; f>ˑJF vC[75^>:93TDgDWw`JHpx[Ѕ9 q{b*Ag@9j-3tTQl(CU㒮<1@;a5^}Aq葄#2P2RDJa[~)c7SŁs{P Se m*bq&Uw"dT6$Fɞw8`7(905'z$4A-؉]QsͥrF5a;KnBygᛊY@8<(uy WhbWCp "0k2o[ s4\Spw/i NR(&]euG)T4t"‘\Ԝ1,(m֖b̒.vj>bjRISw+G`Y9 8e"jR60 I_nyG@gBY2fjd{;12}1>8:lE*tMRy%sYtI,깕B/|mJR#[F"JD ܁O}NBЌ(>CoG6 bC(샺) nIޤtvVe&"ܭP#YO'hX2Y+楳v^/K E&/~&7?t0} zبb[S{l俎,Y1*lƶ c[~XyvXz1cUNȱeHUMmA3GD]+>TEܬeKPf-"-O1D $Ī< Y^Lww^V|"[ 03@9oӝKrc ez&("A%_^ 8ƌJ)w| %aBuنv*Xi:$=*APQj64=YbI{郆W(3 ZԻudNPJU ҍ_$}NIVxliM-hej+?BD@aeC{i~NvrQl5Y<& ӹ5 rzLcL1NS ()O\?+o2%BcI08.9-NY)!;>TmYX wB &ܓY͗CN~m!Ŕs#3TU-5 a)"{vn +W韨Ν'0B0E2%w]8+Rۢ6 ErN[#j벮#.l:ʎbc߶[,W[Gh h 2fe1% B i4¹Ld gK2I /"dQwg Li=+`VٷF/3~c "EjDXCn?F|,YaȘlE6k-<&gP*V`H7<$k>^"m=pӋQ΁ᡶ{zJ2)G`;1ϥW[/ ܺO2)cX m 膱r ُ wieX'{:'+Gx-o1zi4%F-F$[cޏcz1/\426xF&W'_k}s7#66>5aR-!+`Z P䫕x&|E^kN>>x(TaYTH*UvE0xN`@553UW[JNe.$kSO@ixq.vF@lחJ11f(죀GQx܏q˵]O*Z|Ky4#'V~@^OraTtIcu\JEO~%乞aSy1C(|獡 ~Y}}]\͊ |GP)3>߫uf␯S(џJ>u*J8uAuoq2E(bEfˡҝ䢛 V{CAN{tYlGmY\62z2 \~CDB;fou x08Idkzst/`=x4xny4^VC gKaX7QA~ޗRZ\%flx<Ű0Mp@{ :Bw,%Wܥ-)Ջ--tRUX_T\"~yw2o(VK\ȫߜ7U%n)ܸ *WHH!bR,$\/Q,pm^aH} B blnB+L@g8)qj 1?ح/9p 8ѨNeo xǽcdpqC7ڋftKh|'Y3Zy#iJ3){LG&8q (*]}GH?(`<#ol1R\qڬ/ul>YrlvpО9޵ѵaMq|Oh%$5׬G ЏH Pf.q_sG {_W8WpS%ƒ_yD\>mEf d߂%( gv?⡜;z0k>px|S/͵R/[oh _Y. $1 UW%z$F 1(<+lͨv,c*Ŋa0cy&Yfb)1o: YZ