selinux-policy-doc-3.9.7-3.fc14$>i`6Cܼ5s>8V?Vd " ?dh  zz  z  z z r>z szyzzdzp (J8P9@:.G zHzIzX4Y8\Hz] 0z^=b>d>e>f>l>t>8zuD zvJwJ4zxPzVCselinux-policy-doc3.9.73.fc14SELinux policy documentationSELinux policy documentation packageLwx86-14.phx2.fedoraproject.orgFedora ProjectFedora ProjectGPLv2+Fedora ProjectSystem Environment/Basehttp://oss.tresys.com/repos/refpolicy/linuxnoarch P*@a&#(i Gcs@($C*I2y#e'Q%k'g/! -\ iP'd'G!!v1<"=4*-:+vm'q&"E$[zz&..H"E12~nhG_. B!V6)hW#RROQDO@_K{WTWOjIY.XkpnM^^VjOKM}PyTXZX6HYMPR`qHVnS YK.gPKOIImYOOX|Q9MnHOI\SxcZK0MLgXInQPOYwO'JJ[TH^[HHUHeSO_HZVNQ]fOmU^SMSKlH`Y9j]nKc|heLRHVHQMXR(PQRSXLNRSIKQ/Zxb;cSZSzK%KnO?mTMRhaiI MII S/T']MSKsTdJMKVs]DcNKqjVJ_lQV`#NkWnM2NXVMrMjI`Rz _KKMHTMINHTKU HM+RK?\4^9VHHNH׽S QmPM!0$`/!_ȳ5|C]t&NX2/wx8_`&Ynw*ٖaDA큤A큤LwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwLwf90d6642396bd107eb2bead87e1f4abd10f50053d71665ab6c4dc0292976a653846bbdba1149ef9edd39c6f18d37f29e5ed9cb3670521f142ed6d7d2bf9f2b8342d2c3aa4d008aad3243fd00e4723033e27e253289356cdf2cf9ec46135a8327bceb4f36b0f077b7a232a94e214b3b0a5a85152e4d89c193f92ddaba3ede1ad6dee42c9fe5877ef5eeb9614b0ea80c57d6162be7b00867caa9c6d0d75091eada42cb9d55ec7618442649900856be677fe630a04ec4d43d7fce38c53f878026f3d97dd1c0a0fd6aed1a186e6b2f361f61f3c065e79234b9a21de60674e9ad100b470a7811a2d3628ea457036e1faec6a82b8114e0116da003d24c146923bf02e2a89ea058a13cb3974559b2691bd95e93f22534947f35dbae288991b0989937678c8fa92a3467651b2019efbfd1a6f6b046a07f5435ec9094a04b46cb29a1572fa05cbfbb3750b0e33e0a2726b1b2e482f8c36f55e23b22f6fe842f06efe0762c41e46d44788e66682b221fa8692bf813bf55212ba07dc40c76b7ad558de212fc4fdbf7f64354e3ca33b9caf265bb4f4685360760980b05cf8a0762a24b1f0051ed8bc06adcaea4eee0949cff0104ae777f87a9c9b82d95a31be055931d171d4fcb2036d0df048000c81c987221782fdb9d835347e714cbda41ef259be8cefc6fdb96b10038e425ae64805ff4d4ca19c4d863cdeecde654367d901e51f42c132900e7e3acfed1a48cb507e975a41064487c0843304f40e89455ce4ff318f8d505418877864aa3d9c7abe43c6aab3d236defdc3732cd57bc0ba9eaf3aa5c34a0de41a59c8de7139e3e2c95c310ff7d52fc13a75861a63fc377a39fa5784c686f068d62625023ebbe2c3d3ac73310227d984b2d338478d706ec0c21df86c6e60f5f0bbab833583bfe91446da816f077f5d47d89d9445ba0fef4ecef3387164bd7a950f563040da6361f31ad6f96e23dfd8ef0becc97a9718506c8c1cd02cd559ac36d043c107893048896f8a5b7c345217be78c511f9b3a93d6bec501b5d971c0559fca294d57bb59e737ad80f3e849fa171dab0df9c74de697759f1c3802286af06371437f063721469308d12b0068f8f4cc8635bcd1dc80bde7ca6aea9e826dd445e8c8d9af84b93bdbdfcc63bc7ab294083679b07f3e546e23a0c7ebcd81de2e4c4fbcba547072dfaceaccdddafa04582eccac7ac17d98b23ded02bc1a630741be0a011f7fcff35a3d137a33d77e2bac369f7aedb2c070756304a22e8d3a0db193e12d1c58103d54dd5962a65a56112532e1d60f9a5cb0f88981ef33d0d5dd3ac5b9f39d08a4d1214762a5de76195217d4938dce42dc4f6a5e6588ebd758a152deda9a0be35fa83bbd4c4d1dcf4c939af7fbc02c1fa3674fa0fa2fae46a49ddf13e314d5ee8d9651f3a3ae1140d0b1cfd87f59169b3f8e32a7776914250c51cb991557249966a047ac1c504fa8f341283c2cb3af86922ace36911a7e826c84104e1dd9990580bb76ec449166b8c7d8c5c275b548550cf1e6dc39b8b634e7c0a7befbf2b6340b300d5b44aaf51968428e645223912d750738bc8c82719d8b26208bcd851f2e87c5ace66ddc0b89aafe96a03ca954e6fc7eebbb08949b32f24661afa6af7ca8d00ee16248e78bc5899d0e8c062aa92a8d4574440ccfb0643fd73fde259e3dafa8ed6fc1534335710066152df1adfd9ffed666731e195d3dcacb42022290fdc4aede6e6676aeab094ff35a14c2c1135c67aa87bda581b1f5fd675fc74798b3ed8cf349aeed79427133cba2ce9b42d11868048e7f44ca7010ea8ad3eab195666ba85c1927bd86e3c007c9290c6491949b6dde443c1a7fd02860d7f5d41b0802a2ae624d69bd320362509d61ac12a6eb54b4f8b3055a769bce8a3996fdf70ad536c825226f803e0ad9ee837559696177c6e864f4970ce2b8e2e4f7213242746c7095f658013d9226c89c05070461be0dae70a7864eb134d97d4e123fcf393634fba4389e2d0b899374ccf694b7799d826f4599a2c6909b9eb19d847b37bdeb3b995fec3132b86198e4752d756474211004d94c90c28930c1e50cfecb8a5181da390e638d945f70b9cb3b00c4edc7171d0fea5ae3792712d85fd4c179f163953a64bddade406a412d6f18c0e7288728e51bf62901ff1d8dc474c7785ab779fc641a0a65bca77b23ad6d18cbf1f1595b1191d7d14905b9e7a775df334856e2df3dde242f52393892a5d8c3033f3685d3a1d49fc39b6b6199c275bedd7769e7ab294f7bfb80d378fa930ffdefefdecbbef36c0f1046e479741e1135bc5f3864173dd25bb66a5e8e8bb18f25b03f06936206527ce3bd93ed473b270a0121ad4ac68a3f633991858ce5ca2cbe7ffb5af5c6e0b4b65c5db8fedf4c5cdbd70e81f9ae3b3c589b3a309e2ba5c951fd3476c5b7d937679649011cdf4bb72edd7ff2b9b14f5c5e87f4a2249f9bc6090db4aec004dff37bb9bd254891a9d9ba02d5e77bad1e7d9b6e394afffeedb04a53ec6d7a43d2c365bbf22d5f68c0019706230f5102d4fcbdd6f90272137d4235d5e16bc20d967fc99834d83aec0099fedcabe6ed2484d8a73141d13f45a49bd168ddc49583d51907876e1a03ed82a665c554de3450fdef50855a13a345d6404a720164dfebba1f945845a37de0f79c40a8d266057c463c88f603616c9d1e7cf585cabae9480dde793fedaf5761691b20f5e53645375f4366a41257a7c6a2c2c5d71c10776664ae882610f4b1b7f0028939ab3f0474abd79e42a9b558a90900d82fba4e1c9f762388041e94063d4bd05f9865660e1cdc31209154aea03e39e4d197aee76ba14ecc19831f40c4b150f8d2e58d2b293fb22b55e06d98d3e7fca8e54c621cf4d72b0354ee54de7591b995bc93665e926fb04efddb83b2cc56e7407bc28304feaf934c23d1b61d2c4bc3ac0a709aff805b073e461033ab2bc3e7ac927142b12eab1798d8552d0e0029ef25b853c2c08bfe71dae309f0f5dbf61cf5ba25810ecaefa22a643b1a257defea7027cab9629f21fca3ebeb010443f5384694de54243ed3802a088a43a71640ec523918b34880d54fe8a1ac698a9ce49ea9f680f532f240ac328318b18d1d2e0f9fdaf146a2d72fc448c71f31f62ff32b4d2defad5c2b6bd639b7f9d62da136392a25d03d93d6982c9677b8de4be104e70125f6aeede0d4099822863c760ac7a2746db70d963c341a3c0e30b98dcdcd63bc94d188bbe8e40d6b6c748c9f10a0c094958981b32b5b5bde12e63a931c41addfd566787ea7edb568fea6939bbc4df7db9a0982833a85416ccd0bd695b604a7646a4f221a2887ddfd8f3bd82adaf6258ed3e12511592903c117f585c022314a446e4aba1b4fe03e7957c73922d41bea91b50b044be8c32136958720118cc5da71f179d4367d160d0029c83dd9bb73fef377ddea2f2697c624823f8d2f939651c370aae9d6a3283484bbf769289f1bedf85f9516f5b0979363d48879b9b3ea62761b79875c9dcebb04964618ec69923bfd96b1a245427f336a290d562bba1cd74c29a7ba50825cd6df617e3a8749ce83895821a28b8553331b3beac352971f20143b7f47509de7c95f0cfccd770d83b8f8109b685ebe7ec1f12f6a6f48ced489f36f3f2ba572b8455e55647872fe6fe9e02221ba901b5feb911574c9640829904918bde98325e8f2ec56538854def40130de3e0148cd4383f6274bf50f3500b133b6f9fb2fbb5c2c6e92117d8a6bbf61f5d1c55da630f02048174f4e26d734a5cdd5ede59e4e26a97ea9ffc37dd166b2bb1de0283beec251fba4743aed99b3a7bd87e923f3f76d12b8bcc3d8d055857a6df90ceb26c290a4baed66bbcced956fdbb0fb9ab2bd665d074b9ff504de28d1942de5cd0bdac1dbc6c86c347ea0f436e913820b290771dbb34f0cf18304962b2e9951c86756233627b3f8c461dd47b6f4e2af59ad396958a11390ef058ca79b34e4e1dc7e053920f7a91ce1d6a322dde00e25639d43c25df996937beebe3ca860ff927137dfffa4d9d67e9467b8d0cff900d6fc37dc2690344d72df94f3d3b2d82c67d42c0906c0f2aa9471bec5cb5516730a0c90d7516e0b6d5ef06ce4667800f57228ab75e49922c212aa0bf40c63e5aa5796df956a11f0f15073785df006ce521e0aacca34a0336f249e34f1fe1588baf651b6bb983ceb28c474be812468f32904e7b15acb9f635423eb66981195e5861061a7e248f37b73e95fd1584651c72ab62bb04708c87ca09a9abb3752bb51f7822b086fc5241a5b564ac9ca73974ec7c1be24dd80478367a62d8e997f779c748934152085f15871f819f2f8ee82659f17338e430af5c2423317ddfbc4fc6dc60149c3fc1c3e1bcaf3d3cc83f50720eb321e96b6bc0dd4d0a74c24b7f4bdb34fe4e52f03183c38cc09574d762ac7d7417e70b76117d6855adc0644cba7c569e106f2681b47d49040af9a86b7115f5e31055bab781ef7e23fbe21ee15278e85f118bca063f7255e833d85b6f7b290314dd9b125a0cadad8baf6bfa8180d879bb266d6ebdf912af52f57fbef98b6dcf9f7edc063435a8e42ad301e24d93059a5b7560af8db46a31aca827f825c621f290d2d5ba987edd94f1b2d0bb9c7e6693045e31b3ad6b33ede85ae9d08e31e26442a93de59dc66659a8ba93b4f73e15573c5be9017037cb85281eca3ed41229f823540dde80bf93dc7b0db085da2028b2a7dc3506561d3a40cca879fb544e9044d6b44e2fe5ada0e627c9c931649c458717de78e22c6062eff80d477253e03a2755fb66a5de23d1cc5280f322de6a05e58f8549f7cb5f6df21c599d4b59724036e21d3fdea3f06859308a60f5a725754cb452761091a5859b983a540b5543853e6390e6ad3953a422fa366a05b27ff976ad84342a88887315fe8feecdf6576778b4d4c4b64604087ac1acb85cd793e0d90f209bd3b719a51359702e8a9db861ae568705c1d988a2f768c762bbcb9c849d2d7f4b50af8fa6a1b1808ddb2529c17fc348583da13729dd27e13da22058a86a66c43ead43573c438f636a7851625552c6ccff825f61282a1972f818f0b943602578c4c7e232a8d9e9bc275a1ad684486b70549aebe17384425a316903dd66b68ddb82a60a5cb6755e9a3322640f352427aace21799c05eb4ff25ddddb0415b0d2347f33913b3056472355f6448f4ee36affae98731e10ddd5e2beba9fd9e4e63dc1da1e3b1b0a2086fb9db26ded04c2391b143f68daea5f02e8aaba3e51a403324cfd70f0e1ec41fd75f7289bb0d5fa7f03a1cc2a34bc10c9b8f9758caa5b35d8ee8f7297a71f041c6c84c3fe302616de09e3f57dd96cc67d365c02308d591deda9ee6755adc31e2fdba082100fe11ab70e6af7073574878549aae60223ac6a14941bfa1211915ad0bceecd11241fdf94e9f36de263bf919a58bc185114dde42c7cd30ca1ab0ee19a409914820d1f5b4a33d8b1a73537fce181e934f9d1d3ae028e038a221929d32245d1f525ba01b4fb025a267da1b1e8492e5d5b58bcc1b579c198f7a8aca4f8d1be3556574b2f6f2b179a2ec1b8cebab418b76d8cd9e417dd24126418eaad629f701b5285434a755b6a369e3ace259da74c43d7961ac9463a90f2fcfab05ebd6ea8cfb7ce6429456f448b0ac9dd7b5f01422b23f0e67c2b649e380c2c4428f75746cd1c685829090ffff3fa9dd04299105793d744dcf377b3ae3ce6376ec9df3f44104fc575f54ae20aefaac111832efe451819a80d6300d636972788de2162211eebb1a17ef5e9258b67534f708f13f504674acda3319a6c1ab27e9884325d3b002f054f708845292c4e71d424885c1c38ce32ae019a6df3f2c152f70b4e5e95aaf8b2ae2da33d7933fdf009ccda1f314a594817ea29bb8ccf01443ca5be77a83be1a0176a773efb17892b348ec8112d455cf96cd8c23ffe195f770fa35930ea293815c2389e8c1d6503652ee6934a062ae9b9d4563b1c10dea3bb8e490bd325fbf36262ca5d53ffbf51122062df7a5931c30e37062c17b593de67ee2a64e341c7b387548dff62c55102d4e86ad109c7b6a1d2f0617a753797938c31f5ce565fafb524d5efd490b435f2ba4e2c5e090a772f6807a38da530429434877871906b0f5502edde096dc94efc3ae4741516af95197bf3957eaed606751ea7e802863d337d6c3902ad1575f11db9913720daa30cce0ee6e629a7a8fea18d5893be05bd38d501d535aecf0302f08996d665e8100b69ffb2175e1b72fad810567312f70f41de8d388457d301aaa2110d5df2d1d3f2c1be38ac2c40e30f7069a6f6c7eef0806f1f9f5085691f2e1ecf2cb7232ba24c363d61c6748e0ef953a5870c4b92c6fa6f6282057a6dd6692468622e921860e331ca7be515d2994091ba14ae57cb388a2f98d56f9d0b91abfbd6eaa0b3ced95cf517961c9ecf3c943ab76f972b169ef6cba2b0a313bb155540d7e0b1e23f8a894ddb2259bca85f38b6a5a191b0c26778955190ed97277f14b439f70ea0a8db6fa3512e30d883dbcf6eb037e7573692d0bda0ffea51b5841844e8eebad21bd1494b8635f45ec8ba98fc30588ef282a1515a319b283a0f984816ef94f274facd4c663c45466d14bf607a2a58ae5f4b32f450ac8390089d6a08cc84a711d95df285d2aa29defb488ee5b2cd0de7d53a01fc325436f668c362433c0a7a6fe958b8afe808645b53923e86219e632293cf26a9890376026ae88403abba13763a5859da7e79ad0db78bd0818fe752c21e40b0f95ab5e5876a0e8b9c2cde12dcc83bbf39e13d4c0691b6f427e0b660450aecfc9aa12405a5a8150b68206d3d80e34a9886f8b5f33ae5d1166cfd4f5a7c29bd0c6cb45331cc56a6b641e9f3c072c58873e002316453ed93f5b0022d522dd8e8e017ca117613e168003a245d9c67f7c4daa94a8816166296caa516db4e2812057af38897744b8f1e1976e248851901128d549c196eed599364989a3479aabbb17bc0efcc8087c481b8f418c8f39d130c58257a4475f2d650afe11666a0178b7e00b6378870064eb62724648358f92707885d98981e86349a341d25b31d5e04e0a703dc707199ce1c18e5e4cbea7915282d61580a5edc04d1337ea25c0bc8b47924a990aab6181b1c78787c7df30b45c0e4945e4574698d6128831d36c27267273fc6aa8924f51c2faea8b3eb445a62d0403abd5e9381cb74385da517168d2b6cd9f5219fcded790e2e635bccb623a906fc86ba7da114875e1a262278e94840fafc52349d74859daddb2c15b3296728141a55012f633ae9b538f69985395839a444bda348d4a38d00a23c5e5b816244d629df7e4a570e25a70386b8a185fccd63a0de45dbca90f71e090d7728c2d8bd2c870375298ee03bbbd7f91ee437a24e4fabd30a587d07c72fd649d6edb50f2e8cdeaae9f9cf99322d3068ae77c7e39ff4bcdd3173d6075f6dd82d3b60df1cc2a9373625088bfa08e39992536a35c632431c1a146b99122266a05110a8dec19790ada1b5bf13f1ed79ae68cff729fa5f0e143644631d646f1a1ff80772bd95ff5d956f59115f900a4496c597144733813adbd07f4bffa035159503f62260ca1e266a9e1e155f8c6a14a95574bee4f43be33e120b7a56513c310821b5957ec70b08c709e6db723422c154aeb46bdf2c6d78ed5766ac29dcf4ea0d576e7b7fea0f4b4a2a3f631efabcce7bcd743208593135acdc59ea647ff748aff0855bf8444c7057fbcaf55fc60b0525d85a0b66fe3c9974b016f82031268ba0f96be06c8d180ba899b0f43cbacbbeff7c85422751eae50cec90f2a7bdd4e6b75dccd836cd6047799037950e293e689d1bacd920f9455ad081c90ebdb751ab30fd94341e55759a8b8ee9c9c15c1b21767fdb085cf398c77382ebfbabc3913e2297eb2b603ed65bbc6580019e47d0d3adda03e9cf27ef16b8529ec7d29dd213d70826f98b22b32bd09920c648e47899c925980a9dc91b35ea12298052f01ef531c3b1b6996ad38718b4a7a31b4968649860790fe694d125f850edc202d6a536b46ffaf1159dbf7826299f79c40373ef1c7c262cc28f0fee8be8538b4f7ef057af48f7a09028d303ea20f55276aad8e7669b3ec2b5380382c616068d0037dd759fb42371c7a09e9b81b968b050150003dccf33d4f1e6b5194ff8586950aa133505c8d596912626d8ac3a6a6f3e803476c60b079c9b5f5d55aef1dcc47b00368cae019e67bf42bce2dd339c13f9f7596099a1bb25056e42de3b9d7c2ea782b041afbd7ae3ef8faf3bcce46ada256fab6f53857878af9b15b74b7d71aa7589781d7861a8d4bdc7d292501de0c6d1d467a692fdf0bc2d37c32c904d0b54c9582e116bc0ab4fbabbe8815c763660f24e88c7748ed664147e5fd45a3358e1fb8c7d51850977e6357604c8da469d9ab0c9266e23bb4ed3df4f828be18174f19e23a41408c574ac5e38205e966960cb97ce891bc8fd7e99a7cb5114b809caeb19b3117d980c8f8df4c63a10492fdbc0aec38acd30eb10b66b464aa279263e54273007f84c8500aff7b278373529c15c78fea8448613dc78531f8263537de281abf69732582fa0b0511275b0caacfab27d2d3e48825b5dd77e6459cdedcf4b4295846e4da2c88c48e1dcde1b89d46e1a8b094ba46d39b7ef7b59165f0f8471a63aade97ea84ebd56005ad6f536e8d3a4448a927ebc24d233653dc911e88ba435e39bdcce49de77e9cb945a4796513eb44b73862434b43615cd17aaac645e9c93718e1397d8a854d97b62ec649d78298edf38f775c483c943ab4aaa587df7e1636e4895712614554ad5ef569f0c9950bfba290d8878adf5ecff34c2ce2939cbc191fb5faa69cd55b37167a2eca21236eed9c290e7c399cbe5345074223e2bb53315ab24422546ebf58c4bc924a4ddf862788b6e24816925916be10715e023863ef99d6d26f7f654854218dbbee1a3f1678d6bd0fbb2443746062dc25053b12c41f91977b59810310f4a818406cc4b18e5191149032fd39917094a30b3a6b61ae72713c80b912dbb8470d4ec75fb1096509831106fb78400e817a741fcbf6fc14666d9d0a043d9045b8542ec5d47615f5a4c1f7fdcd67533f62251e0318b76d39addeb9ce869d78afa61a27a8f7c45802a53d64115c4445bf395a8fd286a30f0b0923c19d09a98f96a82a5283c847841b234204018d7eb62dc5d2199f018bf841cfd4652aa9abf551ca050bf375174d770834ba7b89c65d70aca5ff6ae22fd595b9cb5a922240b67897d93ca0633310a8fd6778f0ede1a17636db55f8f287974c44fa6224b0e968d97c91bc8dadb02c08a3aa57175fe302aff7dfb940252b28bfdf5e820115dbbf6826fac8247e0704faf607850ecd94842debc0afcb23cd6a19fa3c9373a4dc75caae341c845cc74e71ef523c36e709831be9e7c4cf35e7c6e536b580ad6aa138fe8283e924b6b03c15756f751ad000e4ade9922511cceaf9fe42931ee0389e86720f6a738f249a5703c44e01f01044aec09e04c59d89471c24a65180ad3afb5b959c4bad81d5c24f6d925e576df52b3ad6dc7953a3cd60c93c1299cedde7f90f426d4dcd369f8266a470a43cb3a829ff25c3061b4a58e8d940beea05a0f45c48948b07d3151d24025e6f3d65b6844f81bafe5b12a5f4b2b4e080bd04132fa160e8a3e753f6dee11c2e74685bc610713101fb6719d9eeaf0383f21fbe189fd5d527386c28e6f2df8e2a210f5c0c2fa4bc81a6406b86c2bd7e5ae671cc16cb1aa7e8a2e3d1b099d368f2f6192d9d0accd582f5f1f1c25713c5b50d7f2a75c7fb8c7ddeb5c2654219e9d40f5bd6eedd594f0eda4e639b55ec9ced5ab5db6ab82eb40a1cda1d655f4bfe9df298ba5255d7da70dc9a20cf17f26855a9114447455af6b33adff1c345fa6643d15279305229c4745a0a396965e718ca7a6773a25ceffa79037bc843e67a266122d82659f6cef2bd0dd1099337bf97f366662bf53a6d5e1af22fa52ca63879170f5557ddac3c8a6a74eb5290bd0fef7d6b547fe52a94cbd25fb474a4933d5675b0b9085eedd81ad2f0c46644d85012a810901bd9e487abc70b2c41c737f35cad32ff38a0cc8e57e4ad1b3ade8ad4307aa0c9e1acc453cb13f8533d02611356b469f39e14dabd8cf578bc64416418ab1a0856b5044985922cf3254797c4252c2470a14fd499b2e39ec49be4fccc9db28147488198f76e2a5ca93a5da021c8f10d03098da98a566c8a79495ff5b02eb913b8abfa9230066e92687cacb924851390b1a41dd4a1d17cf04992fb4df60c00db27fd8704c1c0098780d001e93f3b3a896b4d533587154acf05524e0b2f528f6dab18c6f0f5ec4217744072659bd78a096bd2061fd969d399b16789f2506ec02d7755099251ea9bad9ebc30e868df360406621bbb0eab0ffe4db1ef3a9d40486dd6bd0fab1c1e9539b784e12d7db803b966284c7bff87ca94a7d564b73cfa1a4403cdf303796e5c337fb4beb5c7ebe24cff32b49fff196a4c9e8d8ed22017671e0cf59aa45bd0737d4a754898391910bd057781214c94db56e309ffc61c9539bccb0be92e49f73532dea791b4bd3b73b354f8da9e3c124afc996986a3cd147620fb2d41a1a229d6a9e9b90ddb31512f18dd8031ecc708d5b48121d6f60cd22dc4fcbe73966cb69ac3712601a81c77e87fa41b499228fac88bd46d6540edfaf3abad83a1006ba3003c464900f73e4ecbadf5c4f4cdfd46d13707d28aabb64d87e18eebe2d6c9718eedf12297790aa7dc512b7e9325565c907f78e27589775a62ac6cdd84414976d9241a0dc62e96e92206ad7729971a380d3a74445d5dfcbeb92a6d2b5abbbd565aba1504c2a1396d100569c5b2ed654d7c48898a38a79f609340fb4180aea8a2fb70238cada3e08ab5da9f186c4ab5113ef520aa50320b8462af3e1001b8976c6baf861362fbc0dfbc44fdf95951f12eab05cff8ce48bd0b57928580af4a2f5ff1a5a793ff47dc38c8532d16fcd2f7a96f14a63b50ba08c40713c185d34102ba63b45743819599e840b0e41f0ebdb944300b5f4ea688c01bfdd3a455351dbeb0790d44d7950bc5a6632fd4bec467d20e3cbbdd09b019458b1d75e83d79c01750709a48fb4fa0f521eaac91e133fa9454b84094cbbc2dd13e7738ed9199eb60203047b387fe6aa7b8333abc03700aa2563f185ceab6dbcd7617c91d572c33edbced5bf1e895cd31135f355e1b18210c06122d5d883ff14be0e6ae3958a1261ed3f1cff5dd39e53fb5dee0ec5545349521aec0db3b4fb0c561f17a246e8ddce87f2c58ea49f1bb9f501863916ba89c51fcb249e1a5da790dcb33c00b2f439d2c4e69af736ef38a0a34af9dcbb61d75d26da83d19c322d3e375d64d4a7bb637a4d21fc6adbcb2e6b4a5f94e0d39f473fec007e773aa8ee9a092ec84222bf9a96a8c249b9bf1e0e5ac9ce52206a19d4b98fe79c9c24154f52bab710f185c3482f34bb76cd127809d42f0ec5aa7a4c0d58d0fce6cb9fed7a1166bc3f827020e275fa8e46c26b6d2d2523fc8eef04bb99c0752dd2beec938a45dd1309cdfa847097119a59694c018ed2b6793507ec409783d78be8cb8f4ac9780630a5061e365903a0f4d641f517b47b9f26dd24e74df45f2cf2ad069d114424de016b9c3c0419420e64fc89dbf514d2f9494ab3f1a3d9d52cd2d8bcc71048a8e07868f52f4bfc34c974905525d2c112e7d1d8c72896d8bc889dd947b2c2df797e313c1dcb9272723fb595f0fc0dd22ff8c13e6239a626c18ee4010f14f4189f3088b6860cbe9b6acc3f76a0a2b9c3fe524ca0ce93422daddd459b4686a3a20c91f6c48a04c6ebd1ca6401d2e60d59e46d7eb6aa1eea588d06ece011e880af0581afd1e624986ab090a5e8ed7d54b0b942f9677f7a224d1ba8b43f83306babde3632244d4ab8d2d2916aec4f251b07c926663562ca96c16b3f0eab3c9dcc8476b5fdfaf1b929779c90d91e3f9426e69a27028f0ed18951e41241fa43a8935be5e574e989a9573ad744989c5a7093363748e06d955b74f3a8e05469f72d7beeaf98312e92335fc846e446c79a366424a444f750c217e0ca8f0b30db7801fe1fa9c737a83055c9f56530b9825592fe4958026afafb8e43b31043454fefc94c880c403b05fac39ea94dd3a7ccf14c49107b20751182b625e7fa8612f2bbea2d93165c3a15b4e7ad5e3cb3b6276e269c9225b34d9f69506f954833067f1952ba1f8f8e4241cbe9e42268067908316f7f2c960234acc57992efbcf8da08b73726db3485af7554ef1d187a61ed68fe5c765cd8ce352745181056c54166945041d36c0b32403f280b97e0ba8f3aeef37962217dbb6e7106eebe76d26cbe6073edc38fe8d2d18ad15b79a3fd1199160a97b6ea2d733556217ddc2cc595af2d67bed4e8f14f9b992a1992acba9f019b164e3d3f5f7c647229368debce9294da3c847c862f494a40e50a35c25369cbb70351484f1adf1ddcc5718208a0702c0b9883781202de43e0e32f0839e3344a01a69a48a56cee3edb010fc01a943297daa6132dc9b4bb7e477faa8621d02f4f9113cbdd3f3c7aaa3b96acb2daa152f3d032679b15e7e81abe045fd269852684e0b3af9c92cd8b0cda5275c6e8818ebe927f7c1d2b4d573499cf299192828f4b3b4450c9123ddc1cb4ebe8f8c6db40a41e806e84f56b7a1d23fbe670a41f6333a8daf1d2c1f1f3b7f3d461832389a89f018d7245959a92925fd0caf29f1f8d69bf4685c75d0cd1e1e70ce3490375163dfd256927444208c0dbcf994748c7d6d5976bc846b41dd388be4c52593d46b8d396bbf547c090bfd82508b14109223fb79c6226a6a69fb6b12eca290185ea82efc392b605f789a288bdf039d8faed2263d106f000768e61b190e6e2e122606f75821b9ecde573a63b56a116439526b1094d89f66aa82309d738483314eee616402058212022cc5c988b1f728b23447cdfb397e2cc75836398ee2dc80096f86189f87022706b3ba9337f5fd1f177628f32478dfcd4bf453c286d2e60bd2b7a00dcbb23f08ef72cf282b51149231938bf8f1357cacee7052c52469f7b7a22c55fec95db54b67b8751eed31e37b02e4709d61d8e291d2287232283b420986c5caa398911bd0fd4ccb88afce3f1b71dd20a212225a411d9642988cabfa56be3a87482ec0b218b67208d041017116a036c270532e383a372e195c0ddacad851e1a4a667f8980b68a39bd194ea75b59b8bdb149b6c35f66b6f93a56b0c98ff769d041ea776b2005458485654304d3d4aaabd7e9c6cc6d1bf7785adc0b24bd4da83250856263705ef8a06182cda5dcb8794601123038076a8211e847f37282679962b8afc4648ba17f29e6d469e829d0f7c230fc5838eb5762560ed0a640c4419b867a29f5749bde75c846f004aff58b33223865cbce05c361d08c557509964947d5959c00d2b74b8834468ef05961e2970e12171809e4c3218f5d58593dba3be1054eb3234ee75a24ad9f31d29d36267aa1ed81d156503b3c4e9ff6191e42d19f757b54945bb97c52e30503b1d13a48909b3707fe0e2902c7bb9c09e63640f04958274a0fafcbdbd23dccc81975d05ed18bcbaa0bbd2ae0656858e9e3f81f846f3058c1752019a5efa10b0caa6bf0dc3594a15e387fcd8f57279c67a76dbcd585ce0297c82fb2317a4b4426361c79c5c025e0ba4e35cf4b5dff4722c97d9443d98803fbb190519735ad54ed6fe43882d3f9977cce11b991c005c4abacf5a65e1cdd383b669347c114fea048ef2a3eb16f5097b78c16bf7f19dc27b44f533eff89ba2d6f8b12dd4c3609a3f621da33057ba395e4867d01650043091e79e536504477b485ae2f6b7798ad9ab7a688a4da8909d58905da01c84622d11b4d881d25add9c47f34c0a76ea0b967bdb1a9cc49df933fa559a1ac382fb2fc119c8061fd7aa046fdddf7eeb93bdb1974d34af045974f8b112da28efa0a1df92895269eb51f977d76371a48c273fc8205d766b857de760ed6f05ef1ecf73c445bbd7a5397aff7abd71562f0613159543dc1d6ca269abe6f825f77cae92437dd1bb1351aac36a35154363a8185fadee79e39562c9f747bd7f5a0ad8cb3997bec0543d447286678b2d5f45eefa0288366e2e9665602b432c4a88fd374611e011d6dd5f142d6bab2e29c1ed0d317fc3629d0e619b18ca3bb9e22609fee239838037a014aa56fa1a7015064f3b5576fdf9636f7276f60867db437c51f9065c5deb599d6e162f86c1a9513fbb09866a259ddf36be2bc83a8ae24b85be6c7bb5cecfe7c7de71eeb42251266083ad51abea2fb0e56bed5c386c636f67308e1dfb32c2001ff9e62842340b28445bbd5c85129236c335af86628ca284214e562103f3acfceb125243cc09c2084f1c6addccda6e95101b22d64d3a44df5a3d96de33132bed30faf23069614c6d3b923ee6cfaf3a01da4c27af1e8232cecde330f9e42dff1dbd55370fd1feb344a2eb0bbf17c07323731b31512e9a379968e710a838671eac7f3a21444580b7932b244764cf5ded6664e5da17b4af133f9c89a2ed95e29d083200b0b9bee0803d8f13974ff0a45867f83a5ed530c53286c0a9bd56bbdbe7cc17b7d9c628979443d6746f5f53880242e4aeacbeaf2b9cbfbedf7482eed61ee2574263a82e9f500d4ae8a4934ad32023bb05c8739a68c789a7160e1dcaaa64bfe806e66735ddba4d9db831984fecf31b39278dc1872214d1635a88a4e76e9fe7cf54946d6603b0cee33bbc2ba272075c7010756cd3cc6d3ead0ae3b50cdc477590d4cdcdce2205258633f0ac8fae7fb17dd63c60a7a9cd17d2c2a8e984b9b4b69aca056cc9951a222fc601a520aefcab75bb0e18b457236679ad3848b6b7f7aea762d5a28f7c0f9218f84ace15bb941c2b7a913b5021c875abfeccee655a1313694569fa808cd5cccd5280ccbec6b476899bd7ab0e05c5225013a466516c37cb0331cc835e879831392248cb96aebef3552d8bbb8755feb9ba4d240629c103b7f6e309f3ef4bf47a1330997fd5684a6b4b56f4b4f1a42e86d64bc9b5d742599227cc0973ea5d89c41b56a64e667f1ad4202dc0d13cac9a15c7c2032d8e452e501cdf1fc9f8adc7267e91bd7e4074e598d114b96c0e773a321a733e645b1cad2198184bc90b764d214ccbaccbc81d6cb7536b38aef997982ac34aa929dd4c138f85bf498402cb7f577939116316c4862715ec97f032299a7c7d0941896d144164a91e735ffc92081215e0def777cfdb823cdb0c749e459bf734086828d11747f4dc18371c60c39f27afe941791681766ca10a24825631d3c681502eaf5a48b49d8e464120c17cf4049f51b90ee621312e56540edb39f7f81e7d61ea1103f6b75896035fc6148ec5c61f664b315954d108934424463f30d86bac7a46441f8bdefb144927cfa2aa1be2a104d16f28f314e2077e67dcc3a9103660e7e89b429cff114154fb496bc7ffeb010455eb752ec3c511da02ce70fb7302817e0dc1a8482324416dc5c5d9683053acd7d1d6567e54adcea82e69cd788b102cb190fb1443c0b2ab7521a820cfe1b095eb1bd927ab8e503765b384400dd30896c9a2fda9e122839784be40477e51980bf8380381b443f9a4ab0cbe26351e984a52dc7a4c252bcc68a76c715c7d39e0f7ea7e1776a6a652ab2be5766e2eb5925a3bf75f463deb4da65f1983858c4fc92fe6390f5face9ddd7cf9300ff5c14655d75d4eb6f6f943e1ea6e1aa740a42a90d2422b8daa1624dd6968384bd3440f687de627b95867d4a0048611366844d575a1b7747ae3886234956d6fbe304249933c48a4906cb59ddd746c33976d63f21cc08b64f08e83e67f2f24919154d3cab06a666b3448a301275c75126071502bbdb15980e3ba92f634f7f380e7653a8dd347757089852d7364dd4e29c62cd55832d704e9c46da38b4662c62331b30cb722fb6ecd2fdbe73c591e21ec8cbd1d36e14e7fee1f7e2afc908d5a81e830c14ba95f85a5aa0d5d2ca6f8f4fd286ca7026652010703873991365c9cf9dc71c080843f4dac054b57ddc9d3433cb086f0a132d0dac8fb105becd733302b65eeee3c4de7360d97bf75d63f2bf6fba4ddfc288172804ed6e4bd0fbba0d5c52da251aacd48815cd46efe65b801c27a92947c42e2592b6242f22d25637b9da52e0d47baa51b5f10d1ec4b35726ebaf58e8e2b730d90ae822f87302449228457894bc63d81c8cd46581b8f3269826f902fe6b8a6eb59021759e68a13375e57c3c852aa6ba5e16be59710584d48bc2891f77237c42ebc069939a86f73f57c64c44c833fe478c76a12149202ab8c264cbf6395ff69834641353a7542bc1b9a9334944d72dbe7c963db67f5ba87e64c5f926c91095fe6586f233dafe6f3dada6ef95e536661538e1e48f845edfd8273cc7b12c17cb23c14c11d36c8f321836e5c1c13b0611c841a205e983796f3049c5c851a43a0397432ccbad8597893e8ddb5bdb56f9a23517c213b0b02caa49ed4f7e6d65b671ecdda3429e827c441dd6f17491af4c397916f6fb0ac6b98865c5fbe644588641e06570e6fa0b7b59f1834ccec3d34d8e8c0532142644fa9ab6653b3b2224c48a8560100837a87eb971d24c2e0d65318f11d9170d17811100e326759f0c814c490e0dd31dc779b68303096a8b9b81ee2806db7775fad1e102ed324ca2b66d81802793f45c6f94ebc730f74e7a54ef4d282bac3ed0efc694abddd2d58d72f835057370861ecf3fbf988cec70c0c3aeff1ee568f7efe73199c28daf698467c884d16f795b6aad8303c47a6261ad04484b52036e248cb277f75193d018a4bc1adb5ab05322aaa4f1fdaf4bd591c3fcd593ba5e8c1485f7bfe8871a4e2ec00325f2efa8e89433401d362a4033a2bbfc8ed3c945f8e9e643131afa872417f1b4db194058bc12595cea8af3fef5b820ca6d31cd23a6a9b1fa2dc201fee9299c3f9ef12f96ed9fa256c13f3b30566cc754b03563ef5b43rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootselinux-policy-3.9.7-3.fc14.src.rpmselinux-policy-doc    /usr/bin/xdg-openrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)selinux-policyrpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-13.9.7-3.fc145.2-14.8.1LB@LB@L@LMLL@LdLL{L*@L@L5LLA@L@LLL@LcLzLzLzLzL)@L|L|L{@L{@LvW@LvW@Ls@Ls@LrbLrbLk@LjyLjyLe3Lc@La?@LZLYV@LXLN@LN@LMxLMxLI@LH2LF@LEL=L=L=L;L7@L LT@L@LL@L@L0LLGL@K^K^KKKj@K$@KKK@K@K@K@K]K޺K@KtK#@KKՀ@K:@KK͗@KŮ@K\K\K @KKKKK9@KK@KK@K@KKKKrKK~@K,K,K,K@KK8@KKK@K@KqKqKqK}+K{@K{@KuBKs@KqN@KjKie@Kf@K`*K`*K]KXAKTM@KPXKEKEKEKD{@KC)KA@K;@K2@K0K/c@K+nK*@K(K"4@KK>K>K>JJęJH@JH@JJJ_@JjJjJjJ@Jv@Jv@Jv@Jv@J$J$JJ0@J@J@JG@JG@J@JJ@J@J@JJJ#J@JJJ@J:J@JJQJ@J J J|@JzJyt@Jyt@Jx"JrJrJq@Jn@Jn@JmJf@Jd\@J\s@JW-@JT@JS8JKOJI@JCfJCfJB@J@J@J?r@J<@J;}J:,@J7@J67J2C@J0J/@J,@J%@JJB@JJMJ J dJ@J@J@J@J*@J*@II@IIA@IIII@I@IIIX@IX@IX@II@I@IcIIo@Io@IzI)@I@I@@I@@II@I@I@IԨIд@I̿In@I3I3I@II@I@IV@IIaIm@Im@I@I'@II2III@IIIIIIII@III@I1I@III~@I}Iy@Ix_Iw@IuItk@Itk@Io%@Ik0IeIcGIa@I`IVIO@IJ;@IHIAI>]I= @I7@I6tI3IIIIIIII IP@I@IIg@Ig@HHH@HrH~@H,H@HCHHH @H @Hf@Hf@H@H+H@H׈H׈H7@HBH@HǶH@HH|@HHH@H{@H)HHL@H@H@H@H@H}H|@Ht@HsVHr@Hl@HkmHgy@HcH`H_@H^>HQHQHQHO@HFHFH$@DX@DU@DN@DN@DLDH@DGwDGwDDD@@D?D?D;@D;@D:HD:HD2_D1@D1@D+@D+@D+@D'D!<@D!<@D!<@DDD@D@D@DDDDDD@D@D@D@D uD $@D D @D @DDDFC@C@C@C@CR@CR@CR@CR@CR@CCCCC@Ci@CC@C@CtC@C@CC:@CECCC @C @CعCعCعCعCC@C-C-C-C@C@CCǖ@C@CáCáCP@CP@C@C[C @CCg@Cg@CCC!@C~@C,C@CCCCC@CC@C@C@CZCZC @C @CCCf@Cf@Cf@C@CqC @C @C @C @C @CCC}@C7@C7@C7@CBCBCYCCCC}@CqCqDan Walsh 3.9.7-3Dan Walsh 3.9.7-2Dan Walsh 3.9.7-1Dan Walsh 3.9.6-3Dan Walsh 3.9.6-2Dan Walsh 3.9.6-1Dan Walsh 3.9.5-11Dan Walsh 3.9.5-10Dan Walsh 3.9.5-9Dan Walsh 3.9.5-8Dan Walsh 3.9.5-7Dan Walsh 3.9.5-6Dan Walsh 3.9.5-5Dan Walsh 3.9.5-4Dan Walsh 3.9.5-3Dan Walsh 3.9.5-2Dan Walsh 3.9.5-1Dan Walsh 3.9.4-3Dan Walsh 3.9.4-2Dan Walsh 3.9.4-1Dan Walsh 3.9.3-4Dan Walsh 3.9.3-3Dan Walsh 3.9.3-2Dan Walsh 3.9.3-1Dan Walsh 3.9.2-1Dan Walsh 3.9.1-3Dan Walsh 3.9.1-2Dan Walsh 3.9.1-1Dan Walsh 3.9.0-2Dan Walsh 3.9.0-1Dan Walsh 3.8.8-21Dan Walsh 3.8.8-20Dan Walsh 3.8.8-19Dan Walsh 3.8.8-18Dan Walsh 3.8.8-17Dan Walsh 3.8.8-16Dan Walsh 3.8.8-15Dan Walsh 3.8.8-14Dan Walsh 3.8.8-13Dan Walsh 3.8.8-12Dan Walsh 3.8.8-11Dan Walsh 3.8.8-10Dan Walsh 3.8.8-9Dan Walsh 3.8.8-8Dan Walsh 3.8.8-7Dan Walsh 3.8.8-6Dan Walsh 3.8.8-5Dan Walsh 3.8.8-4Dan Walsh 3.8.8-3Dan Walsh 3.8.8-2Dan Walsh 3.8.8-1Dan Walsh 3.8.7-3Dan Walsh 3.8.7-2Dan Walsh 3.8.7-1Dan Walsh 3.8.6-3Miroslav Grepl 3.8.6-2Dan Walsh 3.8.6-1Dan Walsh 3.8.5-1Dan Walsh 3.8.4-1Dan Walsh 3.8.3-4Dan Walsh 3.8.3-3Dan Walsh 3.8.3-2Dan Walsh 3.8.3-1Dan Walsh 3.8.2-1Dan Walsh 3.8.1-5Dan Walsh 3.8.1-4Dan Walsh 3.8.1-3Dan Walsh 3.8.1-2Dan Walsh 3.8.1-1Dan Walsh 3.7.19-22Dan Walsh 3.7.19-21Dan Walsh 3.7.19-20Dan Walsh 3.7.19-19Dan Walsh 3.7.19-17Dan Walsh 3.7.19-16Dan Walsh 3.7.19-15Dan Walsh 3.7.19-14Dan Walsh 3.7.19-13Dan Walsh 3.7.19-12Dan Walsh 3.7.19-11Dan Walsh 3.7.19-10Dan Walsh 3.7.19-9Dan Walsh 3.7.19-8Dan Walsh 3.7.19-7Dan Walsh 3.7.19-6Dan Walsh 3.7.19-5Dan Walsh 3.7.19-4Dan Walsh 3.7.19-3Dan Walsh 3.7.19-2Dan Walsh 3.7.19-1Dan Walsh 3.7.18-3Dan Walsh 3.7.18-2Dan Walsh 3.7.18-1Dan Walsh 3.7.17-6Dan Walsh 3.7.17-5Dan Walsh 3.7.17-4Dan Walsh 3.7.17-3Dan Walsh 3.7.17-2Dan Walsh 3.7.17-1Dan Walsh 3.7.16-2Dan Walsh 3.7.16-1Dan Walsh 3.7.15-4Dan Walsh 3.7.15-3Dan Walsh 3.7.15-2Dan Walsh 3.7.15-1Dan Walsh 3.7.14-5Dan Walsh 3.7.14-4Dan Walsh 3.7.14-3Dan Walsh 3.7.14-2Dan Walsh 3.7.14-1Dan Walsh 3.7.13-4Dan Walsh 3.7.13-3Dan Walsh 3.7.13-2Dan Walsh 3.7.13-1Dan Walsh 3.7.12-1Dan Walsh 3.7.11-1Dan Walsh 3.7.10-5Dan Walsh 3.7.10-4Dan Walsh 3.7.10-3Dan Walsh 3.7.10-2Dan Walsh 3.7.10-1Dan Walsh 3.7.9-4Dan Walsh 3.7.9-3Dan Walsh 3.7.9-2Dan Walsh 3.7.9-1Dan Walsh 3.7.8-11Dan Walsh 3.7.8-9Dan Walsh 3.7.8-8Dan Walsh 3.7.8-7Dan Walsh 3.7.8-6Dan Walsh 3.7.8-5Dan Walsh 3.7.8-4Dan Walsh 3.7.8-3Dan Walsh 3.7.8-2Dan Walsh 3.7.8-1Dan Walsh 3.7.7-3Dan Walsh 3.7.7-2Dan Walsh 3.7.7-1Dan Walsh 3.7.6-1Dan Walsh 3.7.5-8Dan Walsh 3.7.5-7Dan Walsh 3.7.5-6Dan Walsh 3.7.5-5Dan Walsh 3.7.5-4Dan Walsh 3.7.5-3Dan Walsh 3.7.5-2Dan Walsh 3.7.5-1Dan Walsh 3.7.4-4Dan Walsh 3.7.4-3Dan Walsh 3.7.4-2Dan Walsh 3.7.4-1Dan Walsh 3.7.3-1Dan Walsh 3.7.1-1Dan Walsh 3.6.33-2Dan Walsh 3.6.33-1Dan Walsh 3.6.32-17Dan Walsh 3.6.32-16Dan Walsh 3.6.32-15Dan Walsh 3.6.32-13Dan Walsh 3.6.32-12Dan Walsh 3.6.32-11Dan Walsh 3.6.32-10Dan Walsh 3.6.32-9Dan Walsh 3.6.32-8Dan Walsh 3.6.32-7Dan Walsh 3.6.32-6Dan Walsh 3.6.32-5Dan Walsh 3.6.32-4Dan Walsh 3.6.32-3Dan Walsh 3.6.32-2Dan Walsh 3.6.32-1Dan Walsh 3.6.31-5Dan Walsh 3.6.31-4Dan Walsh 3.6.31-3Dan Walsh 3.6.31-2Dan Walsh 3.6.30-6Dan Walsh 3.6.30-5Dan Walsh 3.6.30-4Dan Walsh 3.6.30-3Dan Walsh 3.6.30-2Dan Walsh 3.6.30-1Dan Walsh 3.6.29-2Dan Walsh 3.6.29-1Dan Walsh 3.6.28-9Dan Walsh 3.6.28-8Dan Walsh 3.6.28-7Dan Walsh 3.6.28-6Dan Walsh 3.6.28-5Dan Walsh 3.6.28-4Dan Walsh 3.6.28-3Dan Walsh 3.6.28-2Dan Walsh 3.6.28-1Dan Walsh 3.6.27-1Dan Walsh 3.6.26-11Dan Walsh 3.6.26-10Dan Walsh 3.6.26-9Bill Nottingham 3.6.26-8Dan Walsh 3.6.26-7Dan Walsh 3.6.26-6Dan Walsh 3.6.26-5Dan Walsh 3.6.26-4Dan Walsh 3.6.26-3Dan Walsh 3.6.26-2Dan Walsh 3.6.26-1Dan Walsh 3.6.25-1Dan Walsh 3.6.24-1Dan Walsh 3.6.23-2Dan Walsh 3.6.23-1Dan Walsh 3.6.22-3Dan Walsh 3.6.22-1Dan Walsh 3.6.21-4Dan Walsh 3.6.21-3Tom "spot" Callaway 3.6.21-2Dan Walsh 3.6.21-1Dan Walsh 3.6.20-2Dan Walsh 3.6.20-1Dan Walsh 3.6.19-5Dan Walsh 3.6.19-4Dan Walsh 3.6.19-3Dan Walsh 3.6.19-2Dan Walsh 3.6.19-1Dan Walsh 3.6.18-1Dan Walsh 3.6.17-1Dan Walsh 3.6.16-4Dan Walsh 3.6.16-3Dan Walsh 3.6.16-2Dan Walsh 3.6.16-1Dan Walsh 3.6.14-3Dan Walsh 3.6.14-2Dan Walsh 3.6.14-1Dan Walsh 3.6.13-3Dan Walsh 3.6.13-2Dan Walsh 3.6.13-1Dan Walsh 3.6.12-39Dan Walsh 3.6.12-38Dan Walsh 3.6.12-37Dan Walsh 3.6.12-36Dan Walsh 3.6.12-35Dan Walsh 3.6.12-34Dan Walsh 3.6.12-33Dan Walsh 3.6.12-31Dan Walsh 3.6.12-30Dan Walsh 3.6.12-29Dan Walsh 3.6.12-28Dan Walsh 3.6.12-27Dan Walsh 3.6.12-26Dan Walsh 3.6.12-25Dan Walsh 3.6.12-24Dan Walsh 3.6.12-23Dan Walsh 3.6.12-22Dan Walsh 3.6.12-21Dan Walsh 3.6.12-20Dan Walsh 3.6.12-19Dan Walsh 3.6.12-16Dan Walsh 3.6.12-15Dan Walsh 3.6.12-14Dan Walsh 3.6.12-13Dan Walsh 3.6.12-12Dan Walsh 3.6.12-11Dan Walsh 3.6.12-10Dan Walsh 3.6.12-9Dan Walsh 3.6.12-8Dan Walsh 3.6.12-7Dan Walsh 3.6.12-6Dan Walsh 3.6.12-5Dan Walsh 3.6.12-4Dan Walsh 3.6.12-3Dan Walsh 3.6.12-2Dan Walsh 3.6.12-1Dan Walsh 3.6.11-1Dan Walsh 3.6.10-9Dan Walsh 3.6.10-8Dan Walsh 3.6.10-7Dan Walsh 3.6.10-6Dan Walsh 3.6.10-5Dan Walsh 3.6.10-4Dan Walsh 3.6.10-3Dan Walsh 3.6.10-2Dan Walsh 3.6.10-1Dan Walsh 3.6.9-4Dan Walsh 3.6.9-3Dan Walsh 3.6.9-2Dan Walsh 3.6.9-1Dan Walsh 3.6.8-4Dan Walsh 3.6.8-3Dan Walsh 3.6.8-2Dan Walsh 3.6.8-1Dan Walsh 3.6.7-2Dan Walsh 3.6.7-1Dan Walsh 3.6.6-9Dan Walsh 3.6.6-8Fedora Release Engineering - 3.6.6-7Dan Walsh 3.6.6-6Dan Walsh 3.6.6-5Dan Walsh 3.6.6-4Dan Walsh 3.6.6-3Dan Walsh 3.6.6-2Dan Walsh 3.6.6-1Dan Walsh 3.6.5-3Dan Walsh 3.6.5-1Dan Walsh 3.6.4-6Dan Walsh 3.6.4-5Dan Walsh 3.6.4-4Dan Walsh 3.6.4-3Dan Walsh 3.6.4-2Dan Walsh 3.6.4-1Dan Walsh 3.6.3-13Dan Walsh 3.6.3-12Dan Walsh 3.6.3-11Dan Walsh 3.6.3-10Dan Walsh 3.6.3-9Dan Walsh 3.6.3-8Dan Walsh 3.6.3-7Dan Walsh 3.6.3-6Dan Walsh 3.6.3-3Dan Walsh 3.6.3-2Dan Walsh 3.6.3-1Dan Walsh 3.6.2-5Dan Walsh 3.6.2-4Dan Walsh 3.6.2-3Dan Walsh 3.6.2-2Dan Walsh 3.6.2-1Dan Walsh 3.6.1-15Dan Walsh 3.6.1-14Dan Walsh 3.6.1-13Dan Walsh 3.6.1-12Dan Walsh 3.6.1-11Dan Walsh 3.6.1-10Dan Walsh 3.6.1-9Dan Walsh 3.6.1-8Dan Walsh 3.6.1-7Dan Walsh 3.6.1-4Ignacio Vazquez-Abrams - 3.6.1-2Dan Walsh 3.5.13-19Dan Walsh 3.5.13-18Dan Walsh 3.5.13-17Dan Walsh 3.5.13-16Dan Walsh 3.5.13-15Dan Walsh 3.5.13-14Dan Walsh 3.5.13-13Dan Walsh 3.5.13-12Dan Walsh 3.5.13-11Dan Walsh 3.5.13-9Dan Walsh 3.5.13-8Dan Walsh 3.5.13-7Dan Walsh 3.5.13-6Dan Walsh 3.5.13-5Dan Walsh 3.5.13-4Dan Walsh 3.5.13-3Dan Walsh 3.5.13-2Dan Walsh 3.5.13-1Dan Walsh 3.5.12-3Dan Walsh 3.5.12-2Dan Walsh 3.5.12-1Dan Walsh 3.5.11-1Dan Walsh 3.5.10-3Dan Walsh 3.5.10-2Dan Walsh 3.5.10-1Dan Walsh 3.5.9-4Dan Walsh 3.5.9-3Dan Walsh 3.5.9-2Dan Walsh 3.5.9-1Dan Walsh 3.5.8-7Dan Walsh 3.5.8-6Dan Walsh 3.5.8-5Dan Walsh 3.5.8-4Dan Walsh 3.5.8-3Dan Walsh 3.5.8-1Dan Walsh 3.5.7-2Dan Walsh 3.5.7-1Dan Walsh 3.5.6-2Dan Walsh 3.5.6-1Dan Walsh 3.5.5-4Dan Walsh 3.5.5-3Dan Walsh 3.5.5-2Dan Walsh 3.5.4-2Dan Walsh 3.5.4-1Dan Walsh 3.5.3-1Dan Walsh 3.5.2-2Dan Walsh 3.5.1-5Dan Walsh 3.5.1-4Dan Walsh 3.5.1-3Dan Walsh 3.5.1-2Dan Walsh 3.5.1-1Dan Walsh 3.5.0-1Dan Walsh 3.4.2-14Dan Walsh 3.4.2-13Dan Walsh 3.4.2-12Dan Walsh 3.4.2-11Dan Walsh 3.4.2-10Dan Walsh 3.4.2-9Dan Walsh 3.4.2-8Dan Walsh 3.4.2-7Dan Walsh 3.4.2-6Dan Walsh 3.4.2-5Dan Walsh 3.4.2-4Dan Walsh 3.4.2-3Dan Walsh 3.4.2-2Dan Walsh 3.4.2-1Dan Walsh 3.4.1-5Dan Walsh 3.4.1-3Dan Walsh 3.4.1-2Dan Walsh 3.4.1-1Dan Walsh 3.3.1-48Dan Walsh 3.3.1-47Dan Walsh 3.3.1-46Dan Walsh 3.3.1-45Dan Walsh 3.3.1-44Dan Walsh 3.3.1-43Dan Walsh 3.3.1-42Dan Walsh 3.3.1-41Dan Walsh 3.3.1-39Dan Walsh 3.3.1-37Dan Walsh 3.3.1-36Dan Walsh 3.3.1-33Dan Walsh 3.3.1-32Dan Walsh 3.3.1-31Dan Walsh 3.3.1-30Dan Walsh 3.3.1-29Dan Walsh 3.3.1-28Dan Walsh 3.3.1-27Dan Walsh 3.3.1-26Dan Walsh 3.3.1-25Dan Walsh 3.3.1-24Dan Walsh 3.3.1-23Dan Walsh 3.3.1-22Dan Walsh 3.3.1-21Dan Walsh 3.3.1-20Dan Walsh 3.3.1-19Dan Walsh 3.3.1-18Dan Walsh 3.3.1-17Dan Walsh 3.3.1-16Dan Walsh 3.3.1-15Bill Nottingham 3.3.1-14Dan Walsh 3.3.1-13Dan Walsh 3.3.1-12Dan Walsh 3.3.1-11Dan Walsh 3.3.1-10Dan Walsh 3.3.1-9Dan Walsh 3.3.1-8Dan Walsh 3.3.1-6Dan Walsh 3.3.1-5Dan Walsh 3.3.1-4Dan Walsh 3.3.1-2Dan Walsh 3.3.1-1Dan Walsh 3.3.0-2Dan Walsh 3.3.0-1Dan Walsh 3.2.9-2Dan Walsh 3.2.9-1Dan Walsh 3.2.8-2Dan Walsh 3.2.8-1Dan Walsh 3.2.7-6Dan Walsh 3.2.7-5Dan Walsh 3.2.7-3Dan Walsh 3.2.7-2Dan Walsh 3.2.7-1Dan Walsh 3.2.6-7Dan Walsh 3.2.6-6Dan Walsh 3.2.6-5Dan Walsh 3.2.6-4Dan Walsh 3.2.6-3Dan Walsh 3.2.6-2Dan Walsh 3.2.6-1Dan Walsh 3.2.5-25Dan Walsh 3.2.5-24Dan Walsh 3.2.5-22Dan Walsh 3.2.5-21Dan Walsh 3.2.5-20Dan Walsh 3.2.5-19Dan Walsh 3.2.5-18Dan Walsh 3.2.5-17Dan Walsh 3.2.5-16Dan Walsh 3.2.5-15Dan Walsh 3.2.5-14Dan Walsh 3.2.5-13Dan Walsh 3.2.5-12Dan Walsh 3.2.5-11Dan Walsh 3.2.5-10Dan Walsh 3.2.5-9Dan Walsh 3.2.5-8Dan Walsh 3.2.5-7Dan Walsh 3.2.5-6Dan Walsh 3.2.5-5Dan Walsh 3.2.5-4Dan Walsh 3.2.5-3Dan Walsh 3.2.5-2Dan Walsh 3.2.5-1Dan Walsh 3.2.4-5Dan Walsh 3.2.4-4Dan Walsh 3.2.4-3Dan Walsh 3.2.4-1Dan Walsh 3.2.4-1Dan Walsh 3.2.3-2Dan Walsh 3.2.3-1Dan Walsh 3.2.2-1Dan Walsh 3.2.1-3Dan Walsh 3.2.1-1Dan Walsh 3.1.2-2Dan Walsh 3.1.2-1Dan Walsh 3.1.1-1Dan Walsh 3.1.0-1Dan Walsh 3.0.8-30Dan Walsh 3.0.8-28Dan Walsh 3.0.8-27Dan Walsh 3.0.8-26Dan Walsh 3.0.8-25Dan Walsh 3.0.8-24Dan Walsh 3.0.8-23Dan Walsh 3.0.8-22Dan Walsh 3.0.8-21Dan Walsh 3.0.8-20Dan Walsh 3.0.8-19Dan Walsh 3.0.8-18Dan Walsh 3.0.8-17Dan Walsh 3.0.8-16Dan Walsh 3.0.8-15Dan Walsh 3.0.8-14Dan Walsh 3.0.8-13Dan Walsh 3.0.8-12Dan Walsh 3.0.8-11Dan Walsh 3.0.8-10Dan Walsh 3.0.8-9Dan Walsh 3.0.8-8Dan Walsh 3.0.8-7Dan Walsh 3.0.8-5Dan Walsh 3.0.8-4Dan Walsh 3.0.8-3Dan Walsh 3.0.8-2Dan Walsh 3.0.8-1Dan Walsh 3.0.7-10Dan Walsh 3.0.7-9Dan Walsh 3.0.7-8Dan Walsh 3.0.7-7Dan Walsh 3.0.7-6Dan Walsh 3.0.7-5Dan Walsh 3.0.7-4Dan Walsh 3.0.7-3Dan Walsh 3.0.7-2Dan Walsh 3.0.7-1Dan Walsh 3.0.6-3Dan Walsh 3.0.6-2Dan Walsh 3.0.6-1Dan Walsh 3.0.5-11Dan Walsh 3.0.5-10Dan Walsh 3.0.5-9Dan Walsh 3.0.5-8Dan Walsh 3.0.5-7Dan Walsh 3.0.5-6Dan Walsh 3.0.5-5Dan Walsh 3.0.5-4Dan Walsh 3.0.5-3Dan Walsh 3.0.5-2Dan Walsh 3.0.5-1Dan Walsh 3.0.4-6Dan Walsh 3.0.4-5Dan Walsh 3.0.4-4Dan Walsh 3.0.4-3Dan Walsh 3.0.4-2Dan Walsh 3.0.4-1Dan Walsh 3.0.3-6Dan Walsh 3.0.3-5Dan Walsh 3.0.3-4Dan Walsh 3.0.3-3Dan Walsh 3.0.3-2Dan Walsh 3.0.3-1Dan Walsh 3.0.2-9Dan Walsh 3.0.2-8Dan Walsh 3.0.2-7Dan Walsh 3.0.2-5Dan Walsh 3.0.2-4Dan Walsh 3.0.2-3Dan Walsh 3.0.2-2Dan Walsh 3.0.1-5Dan Walsh 3.0.1-4Dan Walsh 3.0.1-3Dan Walsh 3.0.1-2Dan Walsh 3.0.1-1Dan Walsh 2.6.5-3Dan Walsh 2.6.5-2Dan Walsh 2.6.4-7Dan Walsh 2.6.4-6Dan Walsh 2.6.4-5Dan Walsh 2.6.4-2Dan Walsh 2.6.4-1Dan Walsh 2.6.3-1Dan Walsh 2.6.2-1Dan Walsh 2.6.1-4Dan Walsh 2.6.1-3Dan Walsh 2.6.1-2Dan Walsh 2.6.1-1Dan Walsh 2.5.12-12Dan Walsh 2.5.12-11Dan Walsh 2.5.12-10Dan Walsh 2.5.12-8Dan Walsh 2.5.12-5Dan Walsh 2.5.12-4Dan Walsh 2.5.12-3Dan Walsh 2.5.12-2Dan Walsh 2.5.12-1Dan Walsh 2.5.11-8Dan Walsh 2.5.11-7Dan Walsh 2.5.11-6Dan Walsh 2.5.11-5Dan Walsh 2.5.11-4Dan Walsh 2.5.11-3Dan Walsh 2.5.11-2Dan Walsh 2.5.11-1Dan Walsh 2.5.10-2Dan Walsh 2.5.10-1Dan Walsh 2.5.9-6Dan Walsh 2.5.9-5Dan Walsh 2.5.9-4Dan Walsh 2.5.9-3Dan Walsh 2.5.9-2Dan Walsh 2.5.8-8Dan Walsh 2.5.8-7Dan Walsh 2.5.8-6Dan Walsh 2.5.8-5Dan Walsh 2.5.8-4Dan Walsh 2.5.8-3Dan Walsh 2.5.8-2Dan Walsh 2.5.8-1Dan Walsh 2.5.7-1Dan Walsh 2.5.6-1Dan Walsh 2.5.5-2Dan Walsh 2.5.5-1Dan Walsh 2.5.4-2Dan Walsh 2.5.4-1Dan Walsh 2.5.3-3Dan Walsh 2.5.3-2Dan Walsh 2.5.3-1Dan Walsh 2.5.2-6Dan Walsh 2.5.2-5Dan Walsh 2.5.2-4Dan Walsh 2.5.2-3Dan Walsh 2.5.2-2Dan Walsh 2.5.2-1Dan Walsh 2.5.1-5Dan Walsh 2.5.1-4Dan Walsh 2.5.1-2Dan Walsh 2.5.1-1Dan Walsh 2.4.6-20Dan Walsh 2.4.6-19Dan Walsh 2.4.6-18Dan Walsh 2.4.6-17Dan Walsh 2.4.6-16Dan Walsh 2.4.6-15Dan Walsh 2.4.6-14Dan Walsh 2.4.6-13Dan Walsh 2.4.6-12Dan Walsh 2.4.6-11Dan Walsh 2.4.6-10Dan Walsh 2.4.6-9Dan Walsh 2.4.6-8Dan Walsh 2.4.6-7Dan Walsh 2.4.6-6Dan Walsh 2.4.6-5Dan Walsh 2.4.6-4Dan Walsh 2.4.6-3Dan Walsh 2.4.6-1Dan Walsh 2.4.5-4Dan Walsh 2.4.5-3Dan Walsh 2.4.5-2Dan Walsh 2.4.5-1Dan Walsh 2.4.4-2Dan Walsh 2.4.4-2Dan Walsh 2.4.4-1Dan Walsh 2.4.3-13Dan Walsh 2.4.3-12Dan Walsh 2.4.3-11Dan Walsh 2.4.3-10Dan Walsh 2.4.3-9Dan Walsh 2.4.3-8Dan Walsh 2.4.3-7Dan Walsh 2.4.3-6Dan Walsh 2.4.3-5Dan Walsh 2.4.3-4Dan Walsh 2.4.3-3Dan Walsh 2.4.3-2Dan Walsh 2.4.3-1Dan Walsh 2.4.2-8Dan Walsh 2.4.2-7James Antill 2.4.2-6Dan Walsh 2.4.2-5Dan Walsh 2.4.2-4Dan Walsh 2.4.2-3Dan Walsh 2.4.2-2Dan Walsh 2.4.2-1Dan Walsh 2.4.1-5Dan Walsh 2.4.1-4Dan Walsh 2.4.1-3Dan Walsh 2.4.1-2Dan Walsh 2.4-4Dan Walsh 2.4-3Dan Walsh 2.4-2Dan Walsh 2.4-1Dan Walsh 2.3.19-4Dan Walsh 2.3.19-3Dan Walsh 2.3.19-2Dan Walsh 2.3.19-1James Antill 2.3.18-10James Antill 2.3.18-9Dan Walsh 2.3.18-8Dan Walsh 2.3.18-7Dan Walsh 2.3.18-6Dan Walsh 2.3.18-5Dan Walsh 2.3.18-4Dan Walsh 2.3.18-3Dan Walsh 2.3.18-2Dan Walsh 2.3.18-1Dan Walsh 2.3.17-2Dan Walsh 2.3.17-1Dan Walsh 2.3.16-9Dan Walsh 2.3.16-8Dan Walsh 2.3.16-7Dan Walsh 2.3.16-6Dan Walsh 2.3.16-5Dan Walsh 2.3.16-4Dan Walsh 2.3.16-2Dan Walsh 2.3.16-1Dan Walsh 2.3.15-2Dan Walsh 2.3.15-1Dan Walsh 2.3.14-8Dan Walsh 2.3.14-7Dan Walsh 2.3.14-6Dan Walsh 2.3.14-4Dan Walsh 2.3.14-3Dan Walsh 2.3.14-2Dan Walsh 2.3.14-1Dan Walsh 2.3.13-6Dan Walsh 2.3.13-5Dan Walsh 2.3.13-4Dan Walsh 2.3.13-3Dan Walsh 2.3.13-2Dan Walsh 2.3.13-1Dan Walsh 2.3.12-2Dan Walsh 2.3.12-1Dan Walsh 2.3.11-1Dan Walsh 2.3.10-7Dan Walsh 2.3.10-6Dan Walsh 2.3.10-3Dan Walsh 2.3.10-1Dan Walsh 2.3.9-6Dan Walsh 2.3.9-5Dan Walsh 2.3.9-4Dan Walsh 2.3.9-3Dan Walsh 2.3.9-2Dan Walsh 2.3.9-1Dan Walsh 2.3.8-2Dan Walsh 2.3.7-1Dan Walsh 2.3.6-4Dan Walsh 2.3.6-3Dan Walsh 2.3.6-2Dan Walsh 2.3.6-1Dan Walsh 2.3.5-1Dan Walsh 2.3.4-1Dan Walsh 2.3.3-20Dan Walsh 2.3.3-19Dan Walsh 2.3.3-18Dan Walsh 2.3.3-17Dan Walsh 2.3.3-16Dan Walsh 2.3.3-15Dan Walsh 2.3.3-14Dan Walsh 2.3.3-13Dan Walsh 2.3.3-12Dan Walsh 2.3.3-11Dan Walsh 2.3.3-10Dan Walsh 2.3.3-9Dan Walsh 2.3.3-8Dan Walsh 2.3.3-7Dan Walsh 2.3.3-6Dan Walsh 2.3.3-5Dan Walsh 2.3.3-4Dan Walsh 2.3.3-3Dan Walsh 2.3.3-2Dan Walsh 2.3.3-1Dan Walsh 2.3.2-4Dan Walsh 2.3.2-3Dan Walsh 2.3.2-2Dan Walsh 2.3.2-1Dan Walsh 2.3.1-1Dan Walsh 2.2.49-1Dan Walsh 2.2.48-1Dan Walsh 2.2.47-5Dan Walsh 2.2.47-4Dan Walsh 2.2.47-3Dan Walsh 2.2.47-1Dan Walsh 2.2.46-2Dan Walsh 2.2.46-1Dan Walsh 2.2.45-3Dan Walsh 2.2.45-2Dan Walsh 2.2.45-1Dan Walsh 2.2.44-1Dan Walsh 2.2.43-4Dan Walsh 2.2.43-3Dan Walsh 2.2.43-2Dan Walsh 2.2.43-1Dan Walsh 2.2.42-4Dan Walsh 2.2.42-3Dan Walsh 2.2.42-2Dan Walsh 2.2.42-1Dan Walsh 2.2.41-1Dan Walsh 2.2.40-2Dan Walsh 2.2.40-1Dan Walsh 2.2.39-2Dan Walsh 2.2.39-1Dan Walsh 2.2.38-6Dan Walsh 2.2.38-5Dan Walsh 2.2.38-4Dan Walsh 2.2.38-3Dan Walsh 2.2.38-2Dan Walsh 2.2.38-1Dan Walsh 2.2.37-1Dan Walsh 2.2.36-2Dan Walsh 2.2.36-1James Antill 2.2.35-2Dan Walsh 2.2.35-1Dan Walsh 2.2.34-3Dan Walsh 2.2.34-2Dan Walsh 2.2.34-1Dan Walsh 2.2.33-1Dan Walsh 2.2.32-2Dan Walsh 2.2.32-1Dan Walsh 2.2.31-1Dan Walsh 2.2.30-2Dan Walsh 2.2.30-1Dan Walsh 2.2.29-6Russell Coker 2.2.29-5Dan Walsh 2.2.29-4Dan Walsh 2.2.29-3Dan Walsh 2.2.29-2Dan Walsh 2.2.29-1Dan Walsh 2.2.28-3Dan Walsh 2.2.28-2Dan Walsh 2.2.28-1Dan Walsh 2.2.27-1Dan Walsh 2.2.25-3Dan Walsh 2.2.25-2Dan Walsh 2.2.24-1Dan Walsh 2.2.23-19Dan Walsh 2.2.23-18Dan Walsh 2.2.23-17Karsten Hopp 2.2.23-16Dan Walsh 2.2.23-15Dan Walsh 2.2.23-14Dan Walsh 2.2.23-13Dan Walsh 2.2.23-12Jeremy Katz - 2.2.23-11Jeremy Katz - 2.2.23-10Dan Walsh 2.2.23-9Dan Walsh 2.2.23-8Dan Walsh 2.2.23-7Dan Walsh 2.2.23-5Dan Walsh 2.2.23-4Dan Walsh 2.2.23-3Dan Walsh 2.2.23-2Dan Walsh 2.2.23-1Dan Walsh 2.2.22-2Dan Walsh 2.2.22-1Dan Walsh 2.2.21-9Dan Walsh 2.2.21-8Dan Walsh 2.2.21-7Dan Walsh 2.2.21-6Dan Walsh 2.2.21-5Dan Walsh 2.2.21-4Dan Walsh 2.2.21-3Dan Walsh 2.2.21-2Dan Walsh 2.2.21-1Dan Walsh 2.2.20-1Dan Walsh 2.2.19-2Dan Walsh 2.2.19-1Dan Walsh 2.2.18-2Dan Walsh 2.2.18-1Dan Walsh 2.2.17-2Dan Walsh 2.2.16-1Dan Walsh 2.2.15-4Dan Walsh 2.2.15-3Dan Walsh 2.2.15-1Dan Walsh 2.2.14-2Dan Walsh 2.2.14-1Dan Walsh 2.2.13-1Dan Walsh 2.2.12-1Dan Walsh 2.2.11-2Dan Walsh 2.2.11-1Dan Walsh 2.2.10-1Dan Walsh 2.2.9-2Dan Walsh 2.2.9-1Dan Walsh 2.2.8-2Dan Walsh 2.2.7-1Dan Walsh 2.2.6-3Dan Walsh 2.2.6-2Dan Walsh 2.2.6-1Dan Walsh 2.2.5-1Dan Walsh 2.2.4-1Dan Walsh 2.2.3-1Dan Walsh 2.2.2-1Dan Walsh 2.2.1-1Dan Walsh 2.1.13-1Dan Walsh 2.1.12-3Dan Walsh 2.1.11-1Dan Walsh 2.1.10-1Jeremy Katz - 2.1.9-2Dan Walsh 2.1.9-1Dan Walsh 2.1.8-3Dan Walsh 2.1.8-2Dan Walsh 2.1.8-1Dan Walsh 2.1.7-4Dan Walsh 2.1.7-3Dan Walsh 2.1.7-2Dan Walsh 2.1.7-1Dan Walsh 2.1.6-24Dan Walsh 2.1.6-23Dan Walsh 2.1.6-22Dan Walsh 2.1.6-21Dan Walsh 2.1.6-20Dan Walsh 2.1.6-18Dan Walsh 2.1.6-17Dan Walsh 2.1.6-16Dan Walsh 2.1.6-15Dan Walsh 2.1.6-14Dan Walsh 2.1.6-13Dan Walsh 2.1.6-11Dan Walsh 2.1.6-10Dan Walsh 2.1.6-9Dan Walsh 2.1.6-8Dan Walsh 2.1.6-5Dan Walsh 2.1.6-4Dan Walsh 2.1.6-3Dan Walsh 2.1.6-2Dan Walsh 2.1.6-1Dan Walsh 2.1.4-2Dan Walsh 2.1.4-1Dan Walsh 2.1.3-1Jeremy Katz - 2.1.2-3Dan Walsh 2.1.2-2Dan Walsh 2.1.2-1Dan Walsh 2.1.1-3Dan Walsh 2.1.1-2Dan Walsh 2.1.1-1Dan Walsh 2.1.0-3Dan Walsh 2.1.0-2.Dan Walsh 2.1.0-1.Dan Walsh 2.0.11-2.Dan Walsh 2.0.11-1.Dan Walsh 2.0.9-1.Dan Walsh 2.0.8-1.Dan Walsh 2.0.7-3Dan Walsh 2.0.7-2Dan Walsh 2.0.6-2Dan Walsh 2.0.5-4Dan Walsh 2.0.5-1Dan Walsh 2.0.4-1Dan Walsh 2.0.2-2Dan Walsh 2.0.2-1Dan Walsh 2.0.1-2Dan Walsh 2.0.1-1- Allow cobblerd to list cobler appache content- Fixup for the latest version of upowed - Dontaudit sandbox sending SIGNULL to desktop apps- Update to upstream-Mount command from a confined user generates setattr on /etc/mtab file, need to dontaudit this access - dovecot-auth_t needs ipc_lock - gpm needs to use the user terminal - Allow system_mail_t to append ~/dead.letter - Allow NetworkManager to edit /etc/NetworkManager/NetworkManager.conf - Add pid file to vnstatd - Allow mount to communicate with gfs_controld - Dontaudit hal leaks in setfiles- Lots of fixes for systemd - systemd now executes readahead and tmpwatch type scripts - Needs to manage random seed- Allow smbd to use sys_admin - Remove duplicate file context for tcfmgr - Update to upstream- Fix fusefs handling - Do not allow sandbox to manage nsplugin_rw_t - Allow mozilla_plugin_t to connecto its parent - Allow init_t to connect to plymouthd running as kernel_t - Add mediawiki policy - dontaudit sandbox sending signals to itself. This can happen when they are running at different mcs. - Disable transition from dbus_session_domain to telepathy for F14 - Allow boinc_project to use shm - Allow certmonger to search through directories that contain certs - Allow fail2ban the DAC Override so it can read log files owned by non root users- Start adding support for use_fusefs_home_dirs - Add /var/lib/syslog directory file context - Add /etc/localtime as locale file context- Turn off default transition to mozilla_plugin and telepathy domains from unconfined user - Turn off iptables from unconfined user - Allow sudo to send signals to any domains the user could have transitioned to. - Passwd in single user mode needs to talk to console_device_t - Mozilla_plugin_t needs to connect to web ports, needs to write to video device, and read alsa_home_t alsa setsup pulseaudio - locate tried to read a symbolic link, will dontaudit - New labels for telepathy-sunshine content in homedir - Google is storing other binaries under /opt/google/talkplugin - bluetooth/kernel is creating unlabeled_t socket that I will allow it to use until kernel fixes bug - Add boolean for unconfined_t transition to mozilla_plugin_t and telepathy domains, turned off in F14 on in F15 - modemmanger and bluetooth send dbus messages to devicekit_power - Samba needs to getquota on filesystems labeld samba_share_t- Dontaudit attempts by xdm_t to write to bin_t for kdm - Allow initrc_t to manage system_conf_t- Fixes to allow mozilla_plugin_t to create nsplugin_home_t directory. - Allow mozilla_plugin_t to create tcp/udp/netlink_route sockets - Allow confined users to read xdm_etc_t files - Allow xdm_t to transition to xauth_t for lxdm program- Rearrange firewallgui policy to be more easily updated to upstream, dontaudit search of /home - Allow clamd to send signals to itself - Allow mozilla_plugin_t to read user home content. And unlink pulseaudio shm. - Allow haze to connect to yahoo chat and messenger port tcp:5050. Bz #637339 - Allow guest to run ps command on its processes by allowing it to read /proc - Allow firewallgui to sys_rawio which seems to be required to setup masqerading - Allow all domains to search through default_t directories, in order to find differnet labels. For example people serring up /foo/bar to be share via samba. - Add label for /var/log/slim.log- Pull in cleanups from dgrift - Allow mozilla_plugin_t to execute mozilla_home_t - Allow rpc.quota to do quotamod- Cleanup policy via dgrift - Allow dovecot_deliver to append to inherited log files - Lots of fixes for consolehelper- Fix up Xguest policy- Add vnstat policy - allow libvirt to send audit messages - Allow chrome-sandbox to search nfs_t- Update to upstream- Add the ability to send audit messages to confined admin policies - Remove permissive domain from cmirrord and dontaudit sys_tty_config - Split out unconfined_domain() calls from other unconfined_ calls so we can d - virt needs to be able to read processes to clearance for MLS- Allow all domains that can use cgroups to search tmpfs_t directory - Allow init to send audit messages- Update to upstream- Allow mdadm_t to create files and sock files in /dev/md/- Add policy for ajaxterm- Handle /var/db/sudo - Allow pulseaudio to read alsa config - Allow init to send initrc_t dbus messagesAllow iptables to read shorewall tmp files Change chfn and passwd to use auth_use_pam so they can send dbus messages to fpr intd label vlc as an execmem_exec_t Lots of fixes for mozilla_plugin to run google vidio chat Allow telepath_msn to execute ldconfig and its own tmp files Fix labels on hugepages Allow mdadm to read files on /dev Remove permissive domains and change back to unconfined Allow freshclam to execute shell and bin_t Allow devicekit_power to transition to dhcpc Add boolean to allow icecast to connect to any port- Merge upstream fix of mmap_zero - Allow mount to write files in debugfs_t - Allow corosync to communicate with clvmd via tmpfs - Allow certmaster to read usr_t files - Allow dbus system services to search cgroup_t - Define rlogind_t as a login pgm- Allow mdadm_t to read/write hugetlbfs- Dominic Grift Cleanup - Miroslav Grepl policy for jabberd - Various fixes for mount/livecd and prelink- Merge with upstream- More access needed for devicekit - Add dbadm policy- Merge with upstream- Allow seunshare to fowner- Allow cron to look at user_cron_spool links - Lots of fixes for mozilla_plugin_t - Add sysv file system - Turn unconfined domains to permissive to find additional avcs- Update policy for mozilla_plugin_t- Allow clamscan to read proc_t - Allow mount_t to write to debufs_t dir - Dontaudit mount_t trying to write to security_t dir- Allow clamscan_t execmem if clamd_use_jit set - Add policy for firefox plugin-container- Fix /root/.forward definition- label dead.letter as mail_home_t- Allow login programs to search /cgroups- Fix cert handling- Fix devicekit_power bug - Allow policykit_auth_t more access.- Fix nis calls to allow bind to ports 512-1024 - Fix smartmon- Allow pcscd to read sysfs - systemd fixes - Fix wine_mmap_zero_ignore boolean- Apply Miroslav munin patch - Turn back on allow_execmem and allow_execmod booleans- Merge in fixes from dgrift repository- Update boinc policy - Fix sysstat policy to allow sys_admin - Change failsafe_context to unconfined_r:unconfined_t:s0- New paths for upstart- New permissions for syslog - New labels for /lib/upstart- Add mojomojo policy- Allow systemd to setsockcon on sockets to immitate other services- Remove debugfs label- Update to latest policy- Fix eclipse labeling from IBMSupportAssasstant packageing- Make boot with systemd in enforcing mode- Update to upstream- Add boolean to turn off port forwarding in sshd.- Add support for ebtables - Fixes for rhcs and corosync policy-Update to upstream-Update to upstream-Update to upstream- Add Zarafa policy- Cleanup of aiccu policy - initial mock policy- Lots of random fixes- Update to upstream- Update to upstream - Allow prelink script to signal itself - Cobbler fixes- Add xdm_var_run_t to xserver_stream_connect_xdm - Add cmorrord and mpd policy from Miroslav Grepl- Fix sshd creation of krb cc files for users to be user_tmp_t- Fixes for accountsdialog - Fixes for boinc- Fix label on /var/lib/dokwiki - Change permissive domains to enforcing - Fix libvirt policy to allow it to run on mls- Update to upstream- Allow procmail to execute scripts in the users home dir that are labeled home_bin_t - Fix /var/run/abrtd.lock label- Allow login programs to read krb5_home_t Resolves: 594833 - Add obsoletes for cachefilesfd-selinux package Resolves: #575084- Allow mount to r/w abrt fifo file - Allow svirt_t to getattr on hugetlbfs - Allow abrt to create a directory under /var/spool- Add labels for /sys - Allow sshd to getattr on shutdown - Fixes for munin - Allow sssd to use the kernel key ring - Allow tor to send syslog messages - Allow iptabels to read usr files - allow policykit to read all domains state- Fix path for /var/spool/abrt - Allow nfs_t as an entrypoint for http_sys_script_t - Add policy for piranha - Lots of fixes for sosreport- Allow xm_t to read network state and get and set capabilities - Allow policykit to getattr all processes - Allow denyhosts to connect to tcp port 9911 - Allow pyranha to use raw ip sockets and ptrace itself - Allow unconfined_execmem_t and gconfsd mechanism to dbus - Allow staff to kill ping process - Add additional MLS rules- Allow gdm to edit ~/.gconf dir Resolves: #590677 - Allow dovecot to create directories in /var/lib/dovecot Partially resolves 590224 - Allow avahi to dbus chat with NetworkManager - Fix cobbler labels - Dontaudit iceauth_t leaks - fix /var/lib/lxdm file context - Allow aiccu to use tun tap devices - Dontaudit shutdown using xserver.log- Fixes for sandbox_x_net_t to match access for sandbox_web_t ++ - Add xdm_etc_t for /etc/gdm directory, allow accountsd to manage this directory - Add dontaudit interface for bluetooth dbus - Add chronyd_read_keys, append_keys for initrc_t - Add log support for ksmtuned Resolves: #586663- Allow boinc to send mail- Allow initrc_t to remove dhcpc_state_t - Fix label on sa-update.cron - Allow dhcpc to restart chrony initrc - Don't allow sandbox to send signals to its parent processes - Fix transition from unconfined_t -> unconfined_mount_t -> rpcd_t Resolves: #589136- Fix location of oddjob_mkhomedir Resolves: #587385 - fix labeling on /root/.shosts and ~/.shosts - Allow ipsec_mgmt_t to manage net_conf_t Resolves: #586760- Dontaudit sandbox trying to connect to netlink sockets Resolves: #587609 - Add policy for piranha- Fixups for xguest policy - Fixes for running sandbox firefox- Allow ksmtuned to use terminals Resolves: #586663 - Allow lircd to write to generic usb devices- Allow sandbox_xserver to connectto unconfined stream Resolves: #585171- Allow initrc_t to read slapd_db_t Resolves: #585476 - Allow ipsec_mgmt to use unallocated devpts and to create /etc/resolv.conf Resolves: #585963- Allow rlogind_t to search /root for .rhosts Resolves: #582760 - Fix path for cached_var_t - Fix prelink paths /var/lib/prelink - Allow confined users to direct_dri - Allow mls lvm/cryptosetup to work- Allow virtd_t to manage firewall/iptables config Resolves: #573585- Fix label on /root/.rhosts Resolves: #582760 - Add labels for Picasa - Allow openvpn to read home certs - Allow plymouthd_t to use tty_device_t - Run ncftool as iptables_t - Allow mount to unmount unlabeled_t - Dontaudit hal leaks- Allow livecd to transition to mount- Update to upstream - Allow abrt to delete sosreport Resolves: #579998 - Allow snmp to setuid and gid Resolves: #582155 - Allow smartd to use generic scsi devices Resolves: #582145- Allow ipsec_t to create /etc/resolv.conf with the correct label - Fix reserved port destination - Allow autofs to transition to showmount - Stop crashing tuned- Add telepathysofiasip policy- Update to upstream - Fix label for /opt/google/chrome/chrome-sandbox - Allow modemmanager to dbus with policykit- Fix allow_httpd_mod_auth_pam to use auth_use_pam(httpd_t) - Allow accountsd to read shadow file - Allow apache to send audit messages when using pam - Allow asterisk to bind and connect to sip tcp ports - Fixes for dovecot 2.0 - Allow initrc_t to setattr on milter directories - Add procmail_home_t for .procmailrc file- Fixes for labels during install from livecd- Fix /cgroup file context - Fix broken afs use of unlabled_t - Allow getty to use the console for s390- Fix cgroup handling adding policy for /cgroup - Allow confined users to write to generic usb devices, if user_rw_noexattrfile boolean set- Merge patches from dgrift- Update upstream - Allow abrt to write to the /proc under any process- Fix ~/.fontconfig label - Add /root/.cert label - Allow reading of the fixed_file_disk_t:lnk_file if you can read file - Allow qemu_exec_t as an entrypoint to svirt_t- Update to upstream - Allow tmpreaper to delete sandbox sock files - Allow chrome-sandbox_t to use /dev/zero, and dontaudit getattr file systems - Fixes for gitosis - No transition on livecd to passwd or chfn - Fixes for denyhosts- Add label for /var/lib/upower - Allow logrotate to run sssd - dontaudit readahead on tmpfs blk files - Allow tmpreaper to setattr on sandbox files - Allow confined users to execute dos files - Allow sysadm_t to kill processes running within its clearance - Add accountsd policy - Fixes for corosync policy - Fixes from crontab policy - Allow svirt to manage svirt_image_t chr files - Fixes for qdisk policy - Fixes for sssd policy - Fixes for newrole policy- make libvirt work on an MLS platform- Add qpidd policy- Update to upstream- Allow boinc to read kernel sysctl - Fix snmp port definitions - Allow apache to read anon_inodefs- Allow shutdown dac_override- Add device_t as a file system - Fix sysfs association- Dontaudit ipsec_mgmt sys_ptrace - Allow at to mail its spool files - Allow nsplugin to search in .pulse directory- Update to upstream- Allow users to dbus chat with xdm - Allow users to r/w wireless_device_t - Dontaudit reading of process states by ipsec_mgmt- Fix openoffice from unconfined_t- Add shutdown policy so consolekit can shutdown system- Update to upstream- Update to upstream- Update to upstream - These are merges of my patches - Remove 389 labeling conflicts - Add MLS fixes found in RHEL6 testing - Allow pulseaudio to run as a service - Add label for mssql and allow apache to connect to this database port if boolean set - Dontaudit searches of debugfs mount point - Allow policykit_auth to send signals to itself - Allow modcluster to call getpwnam - Allow swat to signal winbind - Allow usbmux to run as a system role - Allow svirt to create and use devpts- Add MLS fixes found in RHEL6 testing - Allow domains to append to rpm_tmp_t - Add cachefilesfd policy - Dontaudit leaks when transitioning- Change allow_execstack and allow_execmem booleans to on - dontaudit acct using console - Add label for fping - Allow tmpreaper to delete sandbox_file_t - Fix wine dontaudit mmap_zero - Allow abrt to read var_t symlinks- Additional policy for rgmanager- Allow sshd to setattr on pseudo terms- Update to upstream- Allow policykit to send itself signals- Fix duplicate cobbler definition- Fix file context of /var/lib/avahi-autoipd- Merge with upstream- Allow sandbox to work with MLS- Make Chrome work with staff user- Add icecast policy - Cleanup spec file- Add mcelog policy- Lots of fixes found in F12- Fix rpm_dontaudit_leaks- Add getsched to hald_t - Add file context for Fedora/Redhat Directory Server- Allow abrt_helper to getattr on all filesystems - Add label for /opt/real/RealPlayer/plugins/oggfformat\.so- Add gstreamer_home_t for ~/.gstreamer- Update to upstream- Fix git- Turn on puppet policy - Update to dgrift git policy- Move users file to selection by spec file. - Allow vncserver to run as unconfined_u:unconfined_r:unconfined_t- Update to upstream- Remove most of the permissive domains from F12.- Add cobbler policy from dgrift- add usbmon device - Add allow rulse for devicekit_disk- Lots of fixes found in F12, fixes from Tom London- Cleanups from dgrift- Add back xserver_manage_home_fonts- Dontaudit sandbox trying to read nscd and sssd- Update to upstream- Rename udisks-daemon back to devicekit_disk_t policy- Fixes for abrt calls- Add tgtd policy- Update to upstream release- Add asterisk policy back in - Update to upstream release 2.20091117- Update to upstream release 2.20091117- Fixup nut policy- Update to upstream- Allow vpnc request the kernel to load modules- Fix minimum policy installs - Allow udev and rpcbind to request the kernel to load modules- Add plymouth policy - Allow local_login to sys_admin- Allow cupsd_config to read user tmp - Allow snmpd_t to signal itself - Allow sysstat_t to makedir in sysstat_log_t- Update rhcs policy- Allow users to exec restorecond- Allow sendmail to request kernel modules load- Fix all kernel_request_load_module domains- Fix all kernel_request_load_module domains- Remove allow_exec* booleans for confined users. Only available for unconfined_t- More fixes for sandbox_web_t- Allow sshd to create .ssh directory and content- Fix request_module line to module_request- Fix sandbox policy to allow it to run under firefox. - Dont audit leaks.- Fixes for sandbox- Update to upstream - Dontaudit nsplugin search /root - Dontaudit nsplugin sys_nice- Fix label on /usr/bin/notepad, /usr/sbin/vboxadd-service - Remove policycoreutils-python requirement except for minimum- Fix devicekit_disk_t to getattr on all domains sockets and fifo_files - Conflicts seedit (You can not use selinux-policy-targeted and seedit at the same time.)- Add wordpress/wp-content/uploads label - Fixes for sandbox when run from staff_t- Update to upstream - Fixes for devicekit_disk- More fixes- Lots of fixes for initrc and other unconfined domains- Allow xserver to use netlink_kobject_uevent_socket- Fixes for sandbox- Dontaudit setroubleshootfix looking at /root directory- Update to upsteam- Allow gssd to send signals to users - Fix duplicate label for apache content- Update to upstream- Remove polkit_auth on upgrades- Add back in unconfined.pp and unconfineduser.pp - Add Sandbox unshare- Fixes for cdrecord, mdadm, and others- Add capability setting to dhcpc and gpm- Allow cronjobs to read exim_spool_t- Add ABRT policy- Fix system-config-services policy- Allow libvirt to change user componant of virt_domain- Allow cupsd_config_t to be started by dbus - Add smoltclient policy- Add policycoreutils-python to pre install- Make all unconfined_domains permissive so we can see what AVC's happen- Add pt_chown policy- Add kdump policy for Miroslav Grepl - Turn off execstack boolean- Turn on execstack on a temporary basis (#512845)- Allow nsplugin to connecto the session bus - Allow samba_net to write to coolkey data- Allow devicekit_disk to list inotify- Allow svirt images to create sock_file in svirt_var_run_t- Allow exim to getattr on mountpoints - Fixes for pulseaudio- Allow svirt_t to stream_connect to virtd_t- Allod hald_dccm_t to create sock_files in /tmp- More fixes from upstream- Fix polkit label - Remove hidebrokensymptoms for nss_ldap fix - Add modemmanager policy - Lots of merges from upstream - Begin removing textrel_shlib_t labels, from fixed libraries- Update to upstream- Allow certmaster to override dac permissions- Update to upstream- Fix context for VirtualBox- Update to upstream- Allow clamscan read amavis spool files- Fixes for xguest- fix multiple directory ownership of mandirs- Update to upstream- Add rules for rtkit-daemon- Update to upstream - Fix nlscd_stream_connect- Add rtkit policy- Allow rpcd_t to stream connect to rpcbind- Allow kpropd to create tmp files- Fix last duplicate /var/log/rpmpkgs- Update to upstream * add sssd- Update to upstream * cleanup- Update to upstream - Additional mail ports - Add virt_use_usb boolean for svirt- Fix mcs rules to include chr_file and blk_file- Add label for udev-acl- Additional rules for consolekit/udev, privoxy and various other fixes- New version for upstream- Allow NetworkManager to read inotifyfs- Allow setroubleshoot to run mlocate- Update to upstream- Add fish as a shell - Allow fprintd to list usbfs_t - Allow consolekit to search mountpoints - Add proper labeling for shorewall- New log file for vmware - Allow xdm to setattr on user_tmp_t- Upgrade to upstream- Allow fprintd to access sys_ptrace - Add sandbox policy- Add varnishd policy- Fixes for kpropd- Allow brctl to r/w tun_tap_device_t- Add /usr/share/selinux/packages- Allow rpcd_t to send signals to kernel threads- Fix upgrade for F10 to F11- Add policy for /var/lib/fprint-Remove duplicate line- Allow svirt to manage pci and other sysfs device data- Fix package selection handling- Fix /sbin/ip6tables-save context - Allod udev to transition to mount - Fix loading of mls policy file- Add shorewall policy- Additional rules for fprintd and sssd- Allow nsplugin to unix_read unix_write sem for unconfined_java- Fix uml files to be owned by users- Fix Upgrade path to install unconfineduser.pp when unocnfined package is 3.0.0 or less- Allow confined users to manage virt_content_t, since this is home dir content - Allow all domains to read rpm_script_tmp_t which is what shell creates on redirection- Fix labeling on /var/lib/misc/prelink* - Allow xserver to rw_shm_perms with all x_clients - Allow prelink to execute files in the users home directory- Allow initrc_t to delete dev_null - Allow readahead to configure auditing - Fix milter policy - Add /var/lib/readahead- Update to latest milter code from Paul Howarth- Additional perms for readahead- Allow pulseaudio to acquire_svc on session bus - Fix readahead labeling- Allow sysadm_t to run rpm directly - libvirt needs fowner- Allow sshd to read var_lib symlinks for freenx- Allow nsplugin unix_read and write on users shm and sem - Allow sysadm_t to execute su- Dontaudit attempts to getattr user_tmpfs_t by lvm - Allow nfs to share removable media- Add ability to run postdrop from confined users- Fixes for podsleuth- Turn off nsplugin transition - Remove Konsole leaked file descriptors for release- Allow cupsd_t to create link files in print_spool_t - Fix iscsi_stream_connect typo - Fix labeling on /etc/acpi/actions - Don't reinstall unconfine and unconfineuser on upgrade if they are not installed- Allow audioentroy to read etc files- Add fail2ban_var_lib_t - Fixes for devicekit_power_t- Separate out the ucnonfined user from the unconfined.pp package- Make sure unconfined_java_t and unconfined_mono_t create user_tmpfs_t.- Upgrade to latest upstream - Allow devicekit_disk sys_rawio- Dontaudit binds to ports < 1024 for named - Upgrade to latest upstream- Allow podsleuth to use tmpfs files- Add customizable_types for svirt- Allow setroubelshoot exec* privs to prevent crash from bad libraries - add cpufreqselector- Dontaudit listing of /root directory for cron system jobs- Fix missing ld.so.cache label- Add label for ~/.forward and /root/.forward- Fixes for svirt- Fixes to allow svirt read iso files in homedir- Add xenner and wine fixes from mgrepl- Allow mdadm to read/write mls override- Change to svirt to only access svirt_image_t- Fix libvirt policy- Upgrade to latest upstream- Fixes for iscsid and sssd - More cleanups for upgrade from F10 to Rawhide.- Add pulseaudio, sssd policy - Allow networkmanager to exec udevadm- Add pulseaudio context- Upgrade to latest patches- Fixes for libvirt- Update to Latest upstream- Fix setrans.conf to show SystemLow for s0- Further confinement of qemu images via svirt- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Allow NetworkManager to manage /etc/NetworkManager/system-connections- add virtual_image_context and virtual_domain_context files- Allow rpcd_t to send signal to mount_t - Allow libvirtd to run ranged- Fix sysnet/net_conf_t- Fix squidGuard labeling- Re-add corenet_in_generic_if(unlabeled_t)* Tue Feb 10 2009 Dan Walsh 3.6.5-2 - Add git web policy- Add setrans contains from upstream- Do transitions outside of the booleans- Allow xdm to create user_tmp_t sockets for switch user to work- Fix staff_t domain- Grab remainder of network_peer_controls patch- More fixes for devicekit- Upgrade to latest upstream- Add boolean to disallow unconfined_t login- Add back transition from xguest to mozilla- Add virt_content_ro_t and labeling for isos directory- Fixes for wicd daemon- More mls/rpm fixes- Add policy to make dbus/nm-applet work- Remove polgen-ifgen from post and add trigger to policycoreutils-python- Add wm policy - Make mls work in graphics mode- Fixed for DeviceKit- Add devicekit policy- Update to upstream- Define openoffice as an x_domain- Fixes for reading xserver_tmp_t- Allow cups_pdf_t write to nfs_t- Remove audio_entropy policy- Update to upstream- Allow hal_acl_t to getattr/setattr fixed_disk- Change userdom_read_all_users_state to include reading symbolic links in /proc- Fix dbus reading /proc information- Add missing alias for home directory content- Fixes for IBM java location- Allow unconfined_r unconfined_java_t- Add cron_role back to user domains- Fix sudo setting of user keys- Allow iptables to talk to terminals - Fixes for policy kit - lots of fixes for booting.- Cleanup policy- Rebuild for Python 2.6- Fix labeling on /var/spool/rsyslog- Allow postgresl to bind to udp nodes- Allow lvm to dbus chat with hal - Allow rlogind to read nfs_t- Fix cyphesis file context- Allow hal/pm-utils to look at /var/run/video.rom - Add ulogd policy- Additional fixes for cyphesis - Fix certmaster file context - Add policy for system-config-samba - Allow hal to read /var/run/video.rom- Allow dhcpc to restart ypbind - Fixup labeling in /var/run- Add certmaster policy- Fix confined users - Allow xguest to read/write xguest_dbusd_t- Allow openoffice execstack/execmem privs- Allow mozilla to run with unconfined_execmem_t- Dontaudit domains trying to write to .xsession-errors- Allow nsplugin to look at autofs_t directory- Allow kerneloops to create tmp files- More alias for fastcgi- Remove mod_fcgid-selinux package- Fix dovecot access- Policy cleanup- Remove Multiple spec - Add include - Fix makefile to not call per_role_expansion- Fix labeling of libGL- Update to upstream- Update to upstream policy- Fixes for confined xwindows and xdm_t- Allow confined users and xdm to exec wm - Allow nsplugin to talk to fifo files on nfs- Allow NetworkManager to transition to avahi and iptables - Allow domains to search other domains keys, coverup kernel bug- Fix labeling for oracle- Allow nsplugin to comminicate with xdm_tmp_t sock_file- Change all user tmpfs_t files to be labeled user_tmpfs_t - Allow radiusd to create sock_files- Upgrade to upstream- Allow confined users to login with dbus- Fix transition to nsplugin- Add file context for /dev/mspblk.*- Fix transition to nsplugin '- Fix labeling on new pm*log - Allow ssh to bind to all nodes- Merge upstream changes - Add Xavier Toth patches- Add qemu_cache_t for /var/cache/libvirt- Remove gamin policy- Add tinyxs-max file system support- Update to upstream - New handling of init scripts- Allow pcsd to dbus - Add memcache policy- Allow audit dispatcher to kill his children- Update to upstream - Fix crontab use by unconfined user- Allow ifconfig_t to read dhcpc_state_t- Update to upstream- Update to upstream- Allow system-config-selinux to work with policykit- Fix novel labeling- Consolodate pyzor,spamassassin, razor into one security domain - Fix xdm requiring additional perms.- Fixes for logrotate, alsa- Eliminate vbetool duplicate entry- Fix xguest -> xguest_mozilla_t -> xguest_openiffice_t - Change dhclient to be able to red networkmanager_var_run- Update to latest refpolicy - Fix libsemanage initial install bug- Add inotify support to nscd- Allow unconfined_t to setfcap- Allow amanda to read tape - Allow prewikka cgi to use syslog, allow audisp_t to signal cgi - Add support for netware file systems- Allow ypbind apps to net_bind_service- Allow all system domains and application domains to append to any log file- Allow gdm to read rpm database - Allow nsplugin to read mplayer config files- Allow vpnc to run ifconfig- Allow confined users to use postgres - Allow system_mail_t to exec other mail clients - Label mogrel_rails as an apache server- Apply unconfined_execmem_exec_t to haskell programs- Fix prelude file context- allow hplip to talk dbus - Fix context on ~/.local dir- Prevent applications from reading x_device- Add /var/lib/selinux context- Update to upstream- Add livecd policy- Dontaudit search of admin_home for init_system_domain - Rewrite of xace interfaces - Lots of new fs_list_inotify - Allow livecd to transition to setfiles_mac- Begin XAce integration- Merge Upstream- Allow amanada to create data files- Fix initial install, semanage setup- Allow system_r for httpd_unconfined_script_t- Remove dmesg boolean - Allow user domains to read/write game data- Change unconfined_t to transition to unconfined_mono_t when running mono - Change XXX_mono_t to transition to XXX_t when executing bin_t files, so gnome-do will work- Remove old booleans from targeted-booleans.conf file- Add boolean to mmap_zero - allow tor setgid - Allow gnomeclock to set clock- Don't run crontab from unconfined_t- Change etc files to config files to allow users to read them- Lots of fixes for confined domains on NFS_t homedir- dontaudit mrtg reading /proc - Allow iscsi to signal itself - Allow gnomeclock sys_ptrace- Allow dhcpd to read kernel network state- Label /var/run/gdm correctly - Fix unconfined_u user creation- Allow transition from initrc_t to getty_t- Allow passwd to communicate with user sockets to change gnome-keyring- Fix initial install- Allow radvd to use fifo_file - dontaudit setfiles reading links - allow semanage sys_resource - add allow_httpd_mod_auth_ntlm_winbind boolean - Allow privhome apps including dovecot read on nfs and cifs home dirs if the boolean is set- Allow nsplugin to read /etc/mozpluggerrc, user_fonts - Allow syslog to manage innd logs. - Allow procmail to ioctl spamd_exec_t- Allow initrc_t to dbus chat with consolekit.- Additional access for nsplugin - Allow xdm setcap/getcap until pulseaudio is fixed- Allow mount to mkdir on tmpfs - Allow ifconfig to search debugfs- Fix file context for MATLAB - Fixes for xace- Allow stunnel to transition to inetd children domains - Make unconfined_dbusd_t an unconfined domain- Fixes for qemu/virtd- Fix bug in mozilla policy to allow xguest transition - This will fix the libsemanage.dbase_llist_query: could not find record value libsemanage.dbase_llist_query: could not query record value (No such file or directory) bug in xguest- Allow nsplugin to run acroread- Add cups_pdf policy - Add openoffice policy to run in xguest- prewika needs to contact mysql - Allow syslog to read system_map files- Change init_t to an unconfined_domain- Allow init to transition to initrc_t on shell exec. - Fix init to be able to sendto init_t. - Allow syslog to connect to mysql - Allow lvm to manage its own fifo_files - Allow bugzilla to use ldap - More mls fixes- fixes for init policy (#436988) - fix build- Additional changes for MLS policy- Fix initrc_context generation for MLS- Fixes for libvirt- Allow bitlebee to read locale_t- More xselinux rules- Change httpd_$1_script_r*_t to httpd_$1_content_r*_t- Prepare policy for beta release - Change some of the system domains back to unconfined - Turn on some of the booleans- Allow nsplugin_config execstack/execmem - Allow nsplugin_t to read alsa config - Change apache to use user content- Add cyphesis policy- Fix Makefile.devel to build mls modules - Fix qemu to be more specific on labeling- Update to upstream fixes- Allow staff to mounton user_home_t- Add xace support- Add fusectl file system- Fixes from yum-cron - Update to latest upstream- Fix userdom_list_user_files- Merge with upstream- Allow udev to send audit messages- Add additional login users interfaces - userdom_admin_login_user_template(staff)- More fixes for polkit- Eliminate transition from unconfined_t to qemu by default - Fixes for gpg- Update to upstream- Fixes for staff_t- Add policy for kerneloops - Add policy for gnomeclock- Fixes for libvirt- Fixes for nsplugin- More fixes for qemu- Additional ports for vnc and allow qemu and libvirt to search all directories- Update to upstream - Add libvirt policy - add qemu policy- Allow fail2ban to create a socket in /var/run- Allow allow_httpd_mod_auth_pam to work- Add audisp policy and prelude- Allow all user roles to executae samba net command- Allow usertypes to read/write noxattr file systems- Fix nsplugin to allow flashplugin to work in enforcing mode- Allow pam_selinux_permit to kill all processes- Allow ptrace or user processes by users of same type - Add boolean for transition to nsplugin- Allow nsplugin sys_nice, getsched, setsched- Allow login programs to talk dbus to oddjob- Add procmail_log support - Lots of fixes for munin- Allow setroubleshoot to read policy config and send audit messages- Allow users to execute all files in homedir, if boolean set - Allow mount to read samba config- Fixes for xguest to run java plugin- dontaudit pam_t and dbusd writing to user_home_t- Update gpg to allow reading of inotify- Change user and staff roles to work correctly with varied perms- Fix munin log, - Eliminate duplicate mozilla file context - fix wpa_supplicant spec- Fix role transition from unconfined_r to system_r when running rpm - Allow unconfined_domains to communicate with user dbus instances- Fixes for xguest- Let all uncofined domains communicate with dbus unconfined- Run rpm in system_r- Zero out customizable types- Fix definiton of admin_home_t- Fix munin file context- Allow cron to run unconfined apps- Modify default login to unconfined_u- Dontaudit dbus user client search of /root- Update to upstream- Fixes for polkit - Allow xserver to ptrace- Add polkit policy - Symplify userdom context, remove automatic per_role changes- Update to upstream - Allow httpd_sys_script_t to search users homedirs- Allow rpm_script to transition to unconfined_execmem_t- Remove user based home directory separation- Remove user specific crond_t- Merge with upstream - Allow xsever to read hwdata_t - Allow login programs to setkeycreate- Update to upstream- Update to upstream- Allow XServer to read /proc/self/cmdline - Fix unconfined cron jobs - Allow fetchmail to transition to procmail - Fixes for hald_mac - Allow system_mail to transition to exim - Allow tftpd to upload files - Allow xdm to manage unconfined_tmp - Allow udef to read alsa config - Fix xguest to be able to connect to sound port- Fixes for hald_mac - Treat unconfined_home_dir_t as a home dir - dontaudit rhgb writes to fonts and root- Fix dnsmasq - Allow rshd full login privs- Allow rshd to connect to ports > 1023- Fix vpn to bind to port 4500 - Allow ssh to create shm - Add Kismet policy- Allow rpm to chat with networkmanager- Fixes for ipsec and exim mail - Change default to unconfined user- Pass the UNK_PERMS param to makefile - Fix gdm location- Make alsa work- Fixes for consolekit and startx sessions- Dontaudit consoletype talking to unconfined_t- Remove homedir_template- Check asound.state- Fix exim policy- Allow tmpreadper to read man_t - Allow racoon to bind to all nodes - Fixes for finger print reader- Allow xdm to talk to input device (fingerprint reader) - Allow octave to run as java- Allow login programs to set ioctl on /proc- Allow nsswitch apps to read samba_var_t- Fix maxima- Eliminate rpm_t:fifo_file avcs - Fix dbus path for helper app- Fix service start stop terminal avc's- Allow also to search var_lib - New context for dbus launcher- Allow cupsd_config_t to read/write usb_device_t - Support for finger print reader, - Many fixes for clvmd - dbus starting networkmanager- Fix java and mono to run in xguest account- Fix to add xguest account when inititial install - Allow mono, java, wine to run in userdomains- Allow xserver to search devpts_t - Dontaudit ldconfig output to homedir- Remove hplip_etc_t change back to etc_t.- Allow cron to search nfs and samba homedirs- Allow NetworkManager to dbus chat with yum-updated- Allow xfs to bind to port 7100- Allow newalias/sendmail dac_override - Allow bind to bind to all udp ports- Turn off direct transition- Allow wine to run in system role- Fix java labeling- Define user_home_type as home_type- Allow sendmail to create etc_aliases_t- Allow login programs to read symlinks on homedirs- Update an readd modules- Cleanup spec file- Allow xserver to be started by unconfined process and talk to tty- Upgrade to upstream to grab postgressql changes- Add setransd for mls policy- Add ldconfig_cache_t- Allow sshd to write to proc_t for afs login- Allow xserver access to urand- allow dovecot to search mountpoints- Fix Makefile for building policy modules- Fix dhcpc startup of service- Fix dbus chat to not happen for xguest and guest users- Fix nagios cgi - allow squid to communicate with winbind- Fixes for ldconfig- Update from upstream- Add nasd support- Fix new usb devices and dmfm- Eliminate mount_ntfs_t policy, merge into mount_t- Allow xserver to write to ramfs mounted by rhgb- Add context for dbus machine id- Update with latest changes from upstream- Fix prelink to handle execmod- Add ntpd_key_t to handle secret data- Add anon_inodefs - Allow unpriv user exec pam_exec_t - Fix trigger- Allow cups to use generic usb - fix inetd to be able to run random apps (git)- Add proper contexts for rsyslogd- Fixes for xguest policy- Allow execution of gconf- Fix moilscanner update problem- Begin adding policy to separate setsebool from semanage - Fix xserver.if definition to not break sepolgen.if- Add new devices- Add brctl policy- Fix root login to include system_r- Allow prelink to read kernel sysctls- Default to user_u:system_r:unconfined_t- fix squid - Fix rpm running as uid- Fix syslog declaration- Allow avahi to access inotify - Remove a lot of bogus security_t:filesystem avcs- Remove ifdef strict policy from upstream- Remove ifdef strict to allow user_u to login- Fix for amands - Allow semanage to read pp files - Allow rhgb to read xdm_xserver_tmp- Allow kerberos servers to use ldap for backing store- allow alsactl to read kernel state- More fixes for alsactl - Transition from hal and modutils - Fixes for suspend resume. - insmod domtrans to alsactl - insmod writes to hal log- Allow unconfined_t to transition to NetworkManager_t - Fix netlabel policy- Update to latest from upstream- Update to latest from upstream- Update to latest from upstream- Allow pcscd_t to send itself signals-- Fixes for unix_update - Fix logwatch to be able to search all dirs- Upstream bumped the version- Allow consolekit to syslog - Allow ntfs to work with hal- Allow iptables to read etc_runtime_t- MLS Fixes- Fix path of /etc/lvm/cache directory - Fixes for alsactl and pppd_t - Fixes for consolekit- Allow insmod_t to mount kvmfs_t filesystems- Rwho policy - Fixes for consolekit- fixes for fusefs- Fix samba_net to allow it to view samba_var_t- Update to upstream- Fix Sonypic backlight - Allow snmp to look at squid_conf_t- Fixes for pyzor, cyrus, consoletype on everything installs- Fix hald_acl_t to be able to getattr/setattr on usb devices - Dontaudit write to unconfined_pipes for load_policy- Allow bluetooth to read inotifyfs- Fixes for samba domain controller. - Allow ConsoleKit to look at ttys- Fix interface call- Allow syslog-ng to read /var - Allow locate to getattr on all filesystems - nscd needs setcap- Update to upstream- Allow samba to run groupadd- Update to upstream- Allow mdadm to access generic scsi devices- Fix labeling on udev.tbl dirs- Fixes for logwatch- Add fusermount and mount_ntfs policy- Update to upstream - Allow saslauthd to use kerberos keytabs- Fixes for samba_var_t- Allow networkmanager to setpgid - Fixes for hal_acl_t- Remove disable_trans booleans - hald_acl_t needs to talk to nscd- Fix prelink to be able to manage usr dirs.- Allow insmod to launch init scripts- Remove setsebool policy- Fix handling of unlabled_t packets- More of my patches from upstream- Update to latest from upstream - Add fail2ban policy- Update to remove security_t:filesystem getattr problems- Policy for consolekit- Update to latest from upstream- Revert Nemiver change - Set sudo as a corecmd so prelink will work, remove sudoedit mapping, since this will not work, it does not transition. - Allow samba to execute useradd- Upgrade to the latest from upstream- Add sepolgen support - Add bugzilla policy- Fix file context for nemiver- Remove include sym link- Allow mozilla, evolution and thunderbird to read dev_random. Resolves: #227002 - Allow spamd to connect to smtp port Resolves: #227184 - Fixes to make ypxfr work Resolves: #227237- Fix ssh_agent to be marked as an executable - Allow Hal to rw sound device- Fix spamassisin so crond can update spam files - Fixes to allow kpasswd to work - Fixes for bluetooth- Remove some targeted diffs in file context file- Fix squid cachemgr labeling- Add ability to generate webadm_t policy - Lots of new interfaces for httpd - Allow sshd to login as unconfined_t- Continue fixing, additional user domains- Begin adding user confinement to targeted policy- Fixes for prelink, ktalkd, netlabel- Allow prelink when run from rpm to create tmp files Resolves: #221865 - Remove file_context for exportfs Resolves: #221181 - Allow spamassassin to create ~/.spamassissin Resolves: #203290 - Allow ssh access to the krb tickets - Allow sshd to change passwd - Stop newrole -l from working on non securetty Resolves: #200110 - Fixes to run prelink in MLS machine Resolves: #221233 - Allow spamassassin to read var_lib_t dir Resolves: #219234- fix mplayer to work under strict policy - Allow iptables to use nscd Resolves: #220794- Add gconf policy and make it work with strict- Many fixes for strict policy and by extension mls.- Fix to allow ftp to bind to ports > 1024 Resolves: #219349- Allow semanage to exec it self. Label genhomedircon as semanage_exec_t Resolves: #219421 - Allow sysadm_lpr_t to manage other print spool jobs Resolves: #220080- allow automount to setgid Resolves: #219999- Allow cron to polyinstatiate - Fix creation of boot flags Resolves: #207433- Fixes for irqbalance Resolves: #219606- Fix vixie-cron to work on mls Resolves: #207433Resolves: #218978- Allow initrc to create files in /var directories Resolves: #219227- More fixes for MLS Resolves: #181566- More Fixes polyinstatiation Resolves: #216184- More Fixes polyinstatiation - Fix handling of keyrings Resolves: #216184- Fix polyinstatiation - Fix pcscd handling of terminal Resolves: #218149 Resolves: #218350- More fixes for quota Resolves: #212957- ncsd needs to use avahi sockets Resolves: #217640 Resolves: #218014- Allow login programs to polyinstatiate homedirs Resolves: #216184 - Allow quotacheck to create database files Resolves: #212957- Dontaudit appending hal_var_lib files Resolves: #217452 Resolves: #217571 Resolves: #217611 Resolves: #217640 Resolves: #217725- Fix context for helix players file_context #216942- Fix load_policy to be able to mls_write_down so it can talk to the terminal- Fixes for hwclock, clamav, ftp- Move to upstream version which accepted my patches- Fixes for nvidia driver- Allow semanage to signal mcstrans- Update to upstream- Allow modstorage to edit /etc/fstab file- Fix for qemu, /dev/- Fix path to realplayer.bin- Allow xen to connect to xen port- Allow cups to search samba_etc_t directory - Allow xend_t to list auto_mountpoints- Allow xen to search automount- Fix spec of jre files- Fix unconfined access to shadow file- Allow xend to create files in xen_image_t directories- Fixes for /var/lib/hal- Remove ability for sysadm_t to look at audit.log- Fix rpc_port_types - Add aide policy for mls- Merge with upstream- Lots of fixes for ricci- Allow xen to read/write fixed devices with a boolean - Allow apache to search /var/log- Fix policygentool specfile problem. - Allow apache to send signals to it's logging helpers. - Resolves: rhbz#212731- Add perms for swat- Add perms for swat- Allow daemons to dump core files to /- Fixes for ricci- Allow mount.nfs to work- Allow ricci-modstorage to look at lvm_etc_t- Fixes for ricci using saslauthd- Allow mountpoint on home_dir_t and home_t- Update xen to read nfs files- Allow noxattrfs to associate with other noxattrfs- Allow hal to use power_device_t- Allow procemail to look at autofs_t - Allow xen_image_t to work as a fixed device- Refupdate from upstream- Add lots of fixes for mls cups- Lots of fixes for ricci- Fix number of cats- Update to upstream- More iSCSI changes for #209854- Test ISCSI fixes for #209854- allow semodule to rmdir selinux_config_t dir- Fix boot_runtime_t problem on ppc. Should not be creating these files.- Fix context mounts on reboot - Fix ccs creation of directory in /var/log- Update for tallylog- Allow xend to rewrite dhcp conf files - Allow mgetty sys_admin capability- Make xentapctrl work- Don't transition unconfined_t to bootloader_t - Fix label in /dev/xen/blktap- Patch for labeled networking- Fix crond handling for mls- Update to upstream- Remove bluetooth-helper transition - Add selinux_validate for semanage - Require new version of libsemanage- Fix prelink- Fix rhgb- Fix setrans handling on MLS and useradd- Support for fuse - fix vigr- Fix dovecot, amanda - Fix mls- Allow java execheap for itanium- Update with upstream- mls fixes- Update from upstream- More fixes for mls - Revert change on automount transition to mount- Fix cron jobs to run under the correct context- Fixes to make pppd work- Multiple policy fixes - Change max categories to 1023- Fix transition on mcstransd- Add /dev/em8300 defs- Upgrade to upstream- Fix ppp connections from network manager- Add tty access to all domains boolean - Fix gnome-pty-helper context for ia64- Fixed typealias of firstboot_rw_t- Fix location of xel log files - Fix handling of sysadm_r -> rpm_exec_t- Fixes for autofs, lp- Update from upstream- Fixup for test6- Update to upstream- Update to upstream- Fix suspend to disk problems- Lots of fixes for restarting daemons at the console.- Fix audit line - Fix requires line- Upgrade to upstream- Fix install problems- Allow setroubleshoot to getattr on all dirs to gather RPM data- Set /usr/lib/ia32el/ia32x_loader to unconfined_execmem_exec_t for ia32 platform - Fix spec for /dev/adsp- Fix xen tty devices- Fixes for setroubleshoot- Update to upstream- Fixes for stunnel and postgresql - Update from upstream- Update from upstream - More java fixes- Change allow_execstack to default to on, for RHEL5 Beta. This is required because of a Java compiler problem. Hope to turn off for next beta- Misc fixes- More fixes for strict policy- Quiet down anaconda audit messages- Fix setroubleshootd- Update to the latest from upstream- More fixes for xen- Fix anaconda transitions- yet more xen rules- more xen rules- Fixes for Samba- Fixes for xen- Allow setroubleshootd to send mail- Add nagios policy- fixes for setroubleshoot- Added Paul Howarth patch to only load policy packages shipped with this package - Allow pidof from initrc to ptrace higher level domains - Allow firstboot to communicate with hal via dbus- Add policy for /var/run/ldapi- Fix setroubleshoot policy- Fixes for mls use of ssh - named has a new conf file- Fixes to make setroubleshoot work- Cups needs to be able to read domain state off of printer client- add boolean to allow zebra to write config files- setroubleshootd fixes- Allow prelink to read bin_t symlink - allow xfs to read random devices - Change gfs to support xattr- Remove spamassassin_can_network boolean- Update to upstream - Fix lpr domain for mls- Add setroubleshoot policy- Turn off auditallow on setting booleans- Multiple fixes- Update to upstream- Update to upstream - Add new class for kernel key ring- Update to upstream- Update to upstream- Break out selinux-devel package- Add ibmasmfs- Fix policygentool gen_requires- Update from Upstream- Fix spec of realplay- Update to upstream- Fix semanage- Allow useradd to create_home_dir in MLS environment- Update from upstream- Update from upstream- Add oprofilefs- Fix for hplip and Picasus- Update to upstream- Update to upstream- fixes for spamd- fixes for java, openldap and webalizer- Xen fixes- Upgrade to upstream- allow hal to read boot_t files - Upgrade to upstream- allow hal to read boot_t files- Update from upstream- Fixes for amavis- Update from upstream- Allow auditctl to search all directories- Add acquire service for mono.- Turn off allow_execmem boolean - Allow ftp dac_override when allowed to access users homedirs- Clean up spec file - Transition from unconfined_t to prelink_t- Allow execution of cvs command- Update to upstream- Update to upstream- Fix libjvm spec- Update to upstream- Add xm policy - Fix policygentool- Update to upstream - Fix postun to only disable selinux on full removal of the packages- Allow mono to chat with unconfined- Allow procmail to sendmail - Allow nfs to share dosfs- Update to latest from upstream - Allow selinux-policy to be removed and kernel not to crash- Update to latest from upstream - Add James Antill patch for xen - Many fixes for pegasus- Add unconfined_mount_t - Allow privoxy to connect to httpd_cache - fix cups labeleing on /var/cache/cups- Update to latest from upstream- Update to latest from upstream - Allow mono and unconfined to talk to initrc_t dbus objects- Change libraries.fc to stop shlib_t form overriding texrel_shlib_t- Fix samba creating dirs in homedir - Fix NFS so its booleans would work- Allow secadm_t ability to relabel all files - Allow ftp to search xferlog_t directories - Allow mysql to communicate with ldap - Allow rsync to bind to rsync_port_t- Fixed mailman with Postfix #183928 - Allowed semanage to create file_context files. - Allowed amanda_t to access inetd_t TCP sockets and allowed amanda_recover_t to bind to reserved ports. #149030 - Don't allow devpts_t to be associated with tmp_t. - Allow hald_t to stat all mountpoints. - Added boolean samba_share_nfs to allow smbd_t full access to NFS mounts. - Make mount run in mount_t domain from unconfined_t to prevent mislabeling of /etc/mtab. - Changed the file_contexts to not have a regex before the first ^/[a-z]/ whenever possible, makes restorecon slightly faster. - Correct the label of /etc/named.caching-nameserver.conf - Now label /usr/src/kernels/.+/lib(/.*)? as usr_t instead of /usr/src(/.*)?/lib(/.*)? - I don't think we need anything else under /usr/src hit by this. - Granted xen access to /boot, allowed mounting on xend_var_lib_t, and allowed xenstored_t rw access to the xen device node.- More textrel_shlib_t file path fixes - Add ada support- Get auditctl working in MLS policy- Add mono dbus support - Lots of file_context fixes for textrel_shlib_t in FC5 - Turn off execmem auditallow since they are filling log files- Update to upstream- Allow automount and dbus to read cert files- Fix ftp policy - Fix secadm running of auditctl- Update to upstream- Update to upstream- Fix policyhelp- Fix pam_console handling of usb_device - dontaudit logwatch reading /mnt dir- Update to upstream- Get transition rules to create policy.20 at SystemHigh- Allow secadmin to shutdown system - Allow sendmail to exec newalias- MLS Fixes dmidecode needs mls_file_read_up - add ypxfr_t - run init needs access to nscd - udev needs setuid - another xen log file - Dontaudit mount getattr proc_kcore_t- fix buildroot usage (#185391)- Get rid of mount/fsdisk scan of /dev messages - Additional fixes for suspend/resume- Fake make to rebuild enableaudit.pp- Get xen networking running.- Fixes for Xen - enableaudit should not be the same as base.pp - Allow ps to work for all process- more xen policy fixups- more xen fixage (#184393)- Fix blkid specification - Allow postfix to execute mailman_que- Blkid changes - Allow udev access to usb_device_t - Fix post script to create targeted policy config file- Allow lvm tools to create drevice dir- Add Xen support- Fixes for cups - Make cryptosetup work with hal- Load Policy needs translock- Fix cups html interface- Add hal changes suggested by Jeremy - add policyhelp to point at policy html pages- Additional fixes for nvidia and cups- Update to upstream - Merged my latest fixes - Fix cups policy to handle unix domain sockets- NSCD socket is in nscd_var_run_t needs to be able to search dir- Fixes Apache interface file- Fixes for new version of cups- Turn off polyinstatiate util after FC5- Fix problem with privoxy talking to Tor- Turn on polyinstatiation- Don't transition from unconfined_t to fsadm_t- Fix policy update model.- Update to upstream- Fix load_policy to work on MLS - Fix cron_rw_system_pipes for postfix_postdrop_t - Allow audotmount to run showmount- Fix swapon - allow httpd_sys_script_t to be entered via a shell - Allow httpd_sys_script_t to read eventpolfs- Update from upstream- allow cron to read apache files- Fix vpnc policy to work from NetworkManager- Update to upstream - Fix semoudle polcy- Update to upstream - fix sysconfig/selinux link- Add router port for zebra - Add imaze port for spamd - Fixes for amanda and java- Fix bluetooth handling of usb devices - Fix spamd reading of ~/ - fix nvidia spec- Update to upsteam- Add users_extra files- Update to upstream- Add semodule policy- Update from upstream- Fix for spamd to use razor port- Fixes for mcs - Turn on mount and fsadm for unconfined_t- Fixes for the -devel package- Fix for spamd to use ldap- Update to upstream- Update to upstream - Fix rhgb, and other Xorg startups- Update to upstream- Separate out role of secadm for mls- Add inotifyfs handling- Update to upstream - Put back in changes for pup/zen- Many changes for MLS - Turn on strict policy- Update to upstream- Update to upstream - Fixes for booting and logging in on MLS machine- Update to upstream - Turn off execheap execstack for unconfined users - Add mono/wine policy to allow execheap and execstack for them - Add execheap for Xdm policy- Update to upstream - Fixes to fetchmail,- Update to upstream- Fix for procmail/spamassasin - Update to upstream - Add rules to allow rpcd to work with unlabeled_networks.- Update to upstream - Fix ftp Man page- Update to upstream- fix pup transitions (#177262) - fix xen disks (#177599)- Update to upstream- More Fixes for hal and readahead- Fixes for hal and readahead- Update to upstream - Apply- Add wine and fix hal problems- Handle new location of hal scripts- Allow su to read /etc/mtab- Update to upstream- Fix "libsemanage.parse_module_headers: Data did not represent a module." problem- Allow load_policy to read /etc/mtab- Fix dovecot to allow dovecot_auth to look at /tmp- Allow restorecon to read unlabeled_t directories in order to fix labeling.- Add Logwatch policy- Fix /dev/ub[a-z] file context- Fix library specification - Give kudzu execmem privs- Fix hostname in targeted policy- Fix passwd command on mls- Lots of fixes to make mls policy work- Add dri libs to textrel_shlib_t - Add system_r role for java - Add unconfined_exec_t for vncserver - Allow slapd to use kerberos- Add man pages- Add enableaudit.pp- Fix mls policy- Update mls file from old version- Add sids back in - Rebuild with update checkpolicy- Fixes to allow automount to use portmap - Fixes to start kernel in s0-s15:c0.c255- Add java unconfined/execmem policy- Add file context for /var/cvs - Dontaudit webalizer search of homedir- Update from upstream- Clean up spec - range_transition crond to SystemHigh- Fixes for hal - Update to upstream- Turn back on execmem since we need it for java, firefox, ooffice - Allow gpm to stream socket to itself- fix requirements to be on the actual packages so that policy can get created properly at install time- Allow unconfined_t to execmod texrel_shlib_t- Update to upstream - Turn off allow_execmem and allow_execmod booleans - Add tcpd and automount policies- Add two new httpd booleans, turned off by default * httpd_can_network_relay * httpd_can_network_connect_db- Add ghost for policy.20- Update to upstream - Turn off boolean allow_execstack- Change setrans-mls to use new libsetrans - Add default_context rule for xdm- Change Requires to PreReg for requiring of policycoreutils on install- New upstream releaseAdd xdm policyUpdate from upstreamUpdate from upstreamUpdate from upstream- Also trigger to rebuild policy for versions up to 2.0.7.- No longer installing policy.20 file, anaconda handles the building of the app.- Fixes for dovecot and saslauthd- Cleanup pegasus and named - Fix spec file - Fix up passwd changing applications-Update to latest from upstream- Add rules for pegasus and avahi- Start building MLS Policy- Update to upstream- Turn on bash- Initial version                                                                                                                                                                                                                                                                                                                                                                                          222222222Q222U222P2x22222022s222?2222272@2T22322'22222222222R2222$22i2222H22e2n222222 2L22222C2222222222222522222A22(222222B2222222m2222.2X22222222+22222222c2<2V22122K2N222*222k2222222=22222422 2222 2222,2w22f222222"222}22222222v2Y22l222222>222 2_2D222222J22F222222[22222222222%2y2222o2q22222d222222222222222E222222/2)2p222~2Z2W22S22z22292222t222222r22222^22\2j222222222222!222:222a22#2h222 2222222222222u22 2{2G22222222]222 222b2-2222 22222228222|2222&22 222;2M2`2262 22222g22O22I23.9.7-3.fc14selinux-policy-3.9.7Makefile.exampleexample.fcexample.ifexample.tehtmladmin.htmladmin_acct.htmladmin_alsa.htmladmin_amanda.htmladmin_amtu.htmladmin_anaconda.htmladmin_apt.htmladmin_backup.htmladmin_bootloader.htmladmin_brctl.htmladmin_certwatch.htmladmin_consoletype.htmladmin_ddcprobe.htmladmin_dmesg.htmladmin_dmidecode.htmladmin_dpkg.htmladmin_firstboot.htmladmin_kismet.htmladmin_kudzu.htmladmin_logrotate.htmladmin_logwatch.htmladmin_mcelog.htmladmin_mrtg.htmladmin_ncftool.htmladmin_netutils.htmladmin_portage.htmladmin_prelink.htmladmin_quota.htmladmin_readahead.htmladmin_rpm.htmladmin_sectoolm.htmladmin_shorewall.htmladmin_shutdown.htmladmin_smoltclient.htmladmin_su.htmladmin_sudo.htmladmin_sxid.htmladmin_tmpreaper.htmladmin_tripwire.htmladmin_tzdata.htmladmin_updfstab.htmladmin_usbmodules.htmladmin_usermanage.htmladmin_vbetool.htmladmin_vpn.htmlapps.htmlapps_ada.htmlapps_authbind.htmlapps_awstats.htmlapps_calamaris.htmlapps_cdrecord.htmlapps_chrome.htmlapps_cpufreqselector.htmlapps_evolution.htmlapps_execmem.htmlapps_firewallgui.htmlapps_games.htmlapps_gift.htmlapps_gitosis.htmlapps_gnome.htmlapps_gpg.htmlapps_irc.htmlapps_java.htmlapps_kdumpgui.htmlapps_livecd.htmlapps_loadkeys.htmlapps_lockdev.htmlapps_mediawiki.htmlapps_mono.htmlapps_mozilla.htmlapps_mplayer.htmlapps_nsplugin.htmlapps_openoffice.htmlapps_podsleuth.htmlapps_ptchown.htmlapps_pulseaudio.htmlapps_qemu.htmlapps_rssh.htmlapps_sambagui.htmlapps_sandbox.htmlapps_screen.htmlapps_seunshare.htmlapps_slocate.htmlapps_telepathy.htmlapps_thunderbird.htmlapps_tvtime.htmlapps_uml.htmlapps_userhelper.htmlapps_usernetctl.htmlapps_vmware.htmlapps_webalizer.htmlapps_wine.htmlapps_wireshark.htmlapps_wm.htmlapps_xscreensaver.htmlapps_yam.htmlbooleans.htmlglobal_booleans.htmlglobal_tunables.htmlindex.htmlinterfaces.htmlkernel.htmlkernel_corecommands.htmlkernel_corenetwork.htmlkernel_devices.htmlkernel_domain.htmlkernel_files.htmlkernel_filesystem.htmlkernel_kernel.htmlkernel_mcs.htmlkernel_mls.htmlkernel_selinux.htmlkernel_storage.htmlkernel_terminal.htmlkernel_ubac.htmlroles.htmlroles_auditadm.htmlroles_dbadm.htmlroles_guest.htmlroles_logadm.htmlroles_secadm.htmlroles_staff.htmlroles_sysadm.htmlroles_unconfineduser.htmlroles_unprivuser.htmlroles_webadm.htmlroles_xguest.htmlservices.htmlservices_abrt.htmlservices_accountsd.htmlservices_afs.htmlservices_aiccu.htmlservices_aide.htmlservices_aisexec.htmlservices_ajaxterm.htmlservices_amavis.htmlservices_apache.htmlservices_apcupsd.htmlservices_apm.htmlservices_arpwatch.htmlservices_asterisk.htmlservices_audioentropy.htmlservices_automount.htmlservices_avahi.htmlservices_bind.htmlservices_bitlbee.htmlservices_bluetooth.htmlservices_boinc.htmlservices_bugzilla.htmlservices_cachefilesd.htmlservices_canna.htmlservices_ccs.htmlservices_certmaster.htmlservices_certmonger.htmlservices_cgroup.htmlservices_chronyd.htmlservices_cipe.htmlservices_clamav.htmlservices_clockspeed.htmlservices_clogd.htmlservices_cmirrord.htmlservices_cobbler.htmlservices_comsat.htmlservices_consolekit.htmlservices_corosync.htmlservices_courier.htmlservices_cpucontrol.htmlservices_cron.htmlservices_cups.htmlservices_cvs.htmlservices_cyphesis.htmlservices_cyrus.htmlservices_dante.htmlservices_dbskk.htmlservices_dbus.htmlservices_dcc.htmlservices_ddclient.htmlservices_denyhosts.htmlservices_devicekit.htmlservices_dhcp.htmlservices_dictd.htmlservices_distcc.htmlservices_djbdns.htmlservices_dkim.htmlservices_dnsmasq.htmlservices_dovecot.htmlservices_exim.htmlservices_fail2ban.htmlservices_fetchmail.htmlservices_finger.htmlservices_fprintd.htmlservices_ftp.htmlservices_gatekeeper.htmlservices_git.htmlservices_gnomeclock.htmlservices_gpm.htmlservices_gpsd.htmlservices_hadoop.htmlservices_hal.htmlservices_hddtemp.htmlservices_howl.htmlservices_i18n_input.htmlservices_icecast.htmlservices_ifplugd.htmlservices_imaze.htmlservices_inetd.htmlservices_inn.htmlservices_ircd.htmlservices_irqbalance.htmlservices_jabber.htmlservices_kerberos.htmlservices_kerneloops.htmlservices_ksmtuned.htmlservices_ktalk.htmlservices_ldap.htmlservices_likewise.htmlservices_lircd.htmlservices_lpd.htmlservices_mailman.htmlservices_memcached.htmlservices_milter.htmlservices_mock.htmlservices_modemmanager.htmlservices_mojomojo.htmlservices_monop.htmlservices_mpd.htmlservices_mta.htmlservices_munin.htmlservices_mysql.htmlservices_nagios.htmlservices_nessus.htmlservices_networkmanager.htmlservices_nis.htmlservices_nscd.htmlservices_nsd.htmlservices_nslcd.htmlservices_ntop.htmlservices_ntp.htmlservices_nut.htmlservices_nx.htmlservices_oav.htmlservices_oddjob.htmlservices_oident.htmlservices_openca.htmlservices_openct.htmlservices_openvpn.htmlservices_pads.htmlservices_passenger.htmlservices_pcscd.htmlservices_pegasus.htmlservices_perdition.htmlservices_pingd.htmlservices_piranha.htmlservices_plymouthd.htmlservices_policykit.htmlservices_portmap.htmlservices_portreserve.htmlservices_portslave.htmlservices_postfix.htmlservices_postfixpolicyd.htmlservices_postgresql.htmlservices_postgrey.htmlservices_ppp.htmlservices_prelude.htmlservices_privoxy.htmlservices_procmail.htmlservices_psad.htmlservices_publicfile.htmlservices_puppet.htmlservices_pxe.htmlservices_pyicqt.htmlservices_pyzor.htmlservices_qmail.htmlservices_qpidd.htmlservices_radius.htmlservices_radvd.htmlservices_razor.htmlservices_rdisc.htmlservices_remotelogin.htmlservices_resmgr.htmlservices_rgmanager.htmlservices_rhcs.htmlservices_rhgb.htmlservices_ricci.htmlservices_rlogin.htmlservices_roundup.htmlservices_rpc.htmlservices_rpcbind.htmlservices_rshd.htmlservices_rsync.htmlservices_rtkit.htmlservices_rwho.htmlservices_samba.htmlservices_sasl.htmlservices_sendmail.htmlservices_setroubleshoot.htmlservices_slrnpull.htmlservices_smartmon.htmlservices_smokeping.htmlservices_snmp.htmlservices_snort.htmlservices_soundserver.htmlservices_spamassassin.htmlservices_speedtouch.htmlservices_squid.htmlservices_ssh.htmlservices_sssd.htmlservices_stunnel.htmlservices_sysstat.htmlservices_tcpd.htmlservices_telnet.htmlservices_tftp.htmlservices_tgtd.htmlservices_timidity.htmlservices_tor.htmlservices_transproxy.htmlservices_tuned.htmlservices_ucspitcp.htmlservices_ulogd.htmlservices_uptime.htmlservices_usbmuxd.htmlservices_uucp.htmlservices_uwimap.htmlservices_varnishd.htmlservices_vhostmd.htmlservices_virt.htmlservices_vnstatd.htmlservices_w3c.htmlservices_watchdog.htmlservices_xfs.htmlservices_xprint.htmlservices_xserver.htmlservices_zabbix.htmlservices_zarafa.htmlservices_zebra.htmlservices_zosremote.htmlstyle.csssystem.htmlsystem_application.htmlsystem_authlogin.htmlsystem_clock.htmlsystem_daemontools.htmlsystem_fstools.htmlsystem_getty.htmlsystem_hostname.htmlsystem_hotplug.htmlsystem_init.htmlsystem_ipsec.htmlsystem_iptables.htmlsystem_iscsi.htmlsystem_kdump.htmlsystem_libraries.htmlsystem_locallogin.htmlsystem_logging.htmlsystem_lvm.htmlsystem_miscfiles.htmlsystem_modutils.htmlsystem_mount.htmlsystem_netlabel.htmlsystem_pcmcia.htmlsystem_raid.htmlsystem_selinuxutil.htmlsystem_setrans.htmlsystem_sosreport.htmlsystem_sysnetwork.htmlsystem_udev.htmlsystem_unconfined.htmlsystem_userdomain.htmlsystem_xen.htmltemplates.htmltunables.htmlpolicyhelp/usr/share/doc//usr/share/doc/selinux-policy-3.9.7//usr/share/doc/selinux-policy-3.9.7/html//usr/share/selinux/devel/-O2drpmxz2noarch-redhat-linux-gnuASCII textHTML document textdirectory?7zXZ !PH6_]"k%Pkhu"qA)ۚ-lAh- x ,{&d.S .%L!0D*<~!t8eMmŋpRoXŔ+IJ;;Xlo&6'4& LK{dم_7afA2HpLͅ,$VIH2LNnu =2/[7ȊDq4h`p!5ANQkF" gU mjW”VIŃ1!'Ϟ!:r*#H@e&{T5Uͩ1Ѡ X2GD{͝}Q/"]MmkA~M} -ޜ~6FN'i@ +/@FbKGV6.wK{B@FY09 qNu=C*1,c+j8o)Tn%{Tr`0TSzfuaF{oc@vM>(4tW`L ̤+\fBcR-p[)bcvNK:Pk˾7r`xX%;|YE7gF'Jsl3=OuYL9hBET|;j,kC7 n$IN_=ŗueCb)w9<IG٢_ *WuR7r~B67Xz2U>~f1ds$%-4//~H?\ &vZG߷A TP޲2 @;eڭmXDG H; U tl?`] (<6K,GfeDNeXbš-pArMѫ5z*dMU=I\@?V-~2,#Y޲@2w˱e[vY( cթ_LJGlBIFBa[a [nH\~6v:t\|WH{~j=!L+sŕj*en!.sqy_˨6t0vEW޿l=ԑMÐ_{z4 W,qte9( ΋.RN +b6^G4euϊ3xfp.c:?ٱSSqd #xm##6tH*1FU9T|LFmCtι';5Heaп&O&]E;IUu`i[>櫒fu:C_fWjSF7R*M*㎐L):R;%4ǴgNA˪^w>T56TZi|2q_DZHG!Ne۔cc@}7gn@kVYu!듘WQ%ei-qAJϒ[Ea6q9Ҩ'fpQq[M<Ks挰V 9ҬΦXɟHp #A[.DzQ j~}k7[T9嫖4(uO?(v{,[~];,.oM~]+Y;’aF:e+TFњ2QnwޢTXCb l?gGIs x@ ika3$0l5@8Ъ>(:\8w|L)Z͹hH#fO'I}H V9+ܘ'<nzS&0(7 [>b#Ҋ|?=ꐿ->_HnH9)Wv ) B~J:$OO-0IE7п~k` ~E]kX&K>\l*jEtu] ukK&I~DB󡲛m 7oފ6z (V(SiK h\Հ'30t9otHU5  }#>s3ce$Rv4 h=JcB 7C/'7OBQ" I]ne%s[>}܋zc/9,+!muԵ%dX@ CHP>j/ϔ6Ct+i-l3edK٘c!wpllǫ0OEAXu٪]]{8͓;b^ؓ:-cw<~J[WJ߅,ag8v#JTsbx1Q$-?OZNڔGʧ}Hn TWLölzU(O59:dI N[e_w34 &]'l!DrOlPnv.2/W.ge@*ߚ6l lLC ,"VId0m5ժ#kDsY{䁪EMe0<*Bsg;{GVh7V1a!\,)1π/JJG,=1Ķ2O[k<+qL-j{.|3h8j@V(-t5;@-fY5JO~o@D bU M7Z Bt|Zzߍ& =D@nש.^m/ 9#vAywkh0i|apZ_H *_@Pgv=\^CwV6@( Qm-k,,m < [ZhukƻmYe˓ؕ|u@4DG8aP\#?gJ%u_SƛJQX[3(㔧 %Ei/1+5Y\9ZONRzN,;M6z@d}_KnA\u DW}ΩR}䄰ݳg 7Ie'_K^3K$45pH3EzٍupU"vr~ߕ跸q7P+][[hOibTͪhDSHa:;1hi/)֤ o.iD_p #pF YZ