libselinux-devel-2.0.94-2.fc13$>L$Nj$+Ϸn>91?1d ! R  '=[ah  X  0n 1(3699d&e&f&l&t&u)tv+w,x/ y11Clibselinux-devel2.0.942.fc13Header files and libraries used to build SELinuxThe libselinux-devel package contains the libraries and header files needed for developing SELinux applications.L'x86-15.phx2.fedoraproject.orgxFedora ProjectFedora ProjectPublic DomainFedora ProjectDevelopment/Librarieshttp://www.selinuxproject.orglinuxi686=g^ %uZ]F,/(2u(,22G,000R00(/23+++++++++*/E'*88888L8&&&\@2**8666,,,88*886@3333336663 46.,$t83"88888888G8_888d8888866/&*./02288A큤L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%L%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../../lib/libselinux.so.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootlibselinux-2.0.94-2.fc13.src.rpmpkgconfig(libselinux)libselinux-devellibselinux-devel(x86-32)@@ @     /usr/bin/pkg-configlibselinuxlibselinux.so.1libsepol-develpkgconfig(libsepol)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(VersionedDependencies)rpmlib(PayloadIsXz)2.0.94-2.fc132.0.32-13.0.4-14.6.0-14.0-13.0.3-15.2-14.8.1LrbKKrK@KKqK}+KTM@KA@K@JJJJG@JG@JG@JjJS8JS8JB@J@JMIܑI@IԨIbI̿I@IV@III@I@I2I@IcGIcGIcGIG@IG@IBR@I1.I!\I!\I-HHHe@He@He@He@H@HHH@Ht@HsVHgy@H^>H^>H-w@H!H @H@G@GG#GF@G@GGƢ@GƢ@G­G@GGD@G@G@G@G,@G,@G@GG@GZ@GZ@GeGeG|@G|@GO@GO@G<4G<4G0W@G'@FF@FIFFFFF&@FF@FvFFS@FF@FF]F@FtFFzh@Fw@Fm9@F` @F; @F-@F,F@F@FF*FF @F @FoE@EE@E4@EEEɿ@EEEElElEx@E&E=E=E@Ex@EvEnEYEK/@E>@E4EE EgEEDfDDDDq@D@DB@DB@DB@DB@D{DDX@D4D4D4DD@D@D~D~D|3DvDu@Dr@Dr@DlaDk@DiD`@D_2D_2DX@DWID?D;@D'Dj@C@CCC-Cǖ@Cǖ@C@CCC8@C@CC @CCqC @CCCC@CBC@C@C|pC|pC{@CyCp@Cp@CoACkM@CiCf@C_oC_oC^@C^@CX@CWCS@COCFc@CFc@CECECBnCA@C;@C:C%mC%mC%mC%mCC@CC C a@C a@C&B=BۙB@B@Bn-@Bn-@Bn-@Bn-@BgB] B] BZfBS@BQ,@BIC@BAZ@B9q@B9q@B06B-B$Y@B#BB@B@B LB LBBAA)@A@A@A@A@A@A@AyAҜ@AJA@A`A`AA@AA@Ak@AAA@AvA@AAoA]FA]FAQi@AN@AI@AF@AF@AA@A>@A>@A7 @A7 @A5A4h@A3A3A-A-A+-A(A$@A!@A A A@A@@@q@7@@@@6@@@A@)@@@@@@@@@~y@@~y@@~y@@}'@s@@s@@s@@l@@ia@@b@b@b@O@@O@@Dw@@9@@,@@ @/@@???E@?E@?٭?????@?@?@?}d?z?a@?M?D@>S@Dan Walsh - 2.0.94-2Dan Walsh - 2.0.94-1Dan Walsh - 2.0.93-1Dan Walsh - 2.0.92-1Dan Walsh - 2.0.91-1Dan Walsh - 2.0.90-5Dan Walsh - 2.0.90-4Dan Walsh - 2.0.90-3Dan Walsh - 2.0.90-2Dan Walsh - 2.0.90-1Dan Walsh - 2.0.89-2Dan Walsh - 2.0.89-1Dan Walsh - 2.0.88-1Dan Walsh - 2.0.87-1Dan Walsh - 2.0.86-2Dan Walsh - 2.0.86-1Fedora Release Engineering - 2.0.85-2Dan Walsh - 2.0.85-1Dan Walsh - 2.0.84-1Dan Walsh - 2.0.82-2Dan Walsh - 2.0.82-1Dan Walsh - 2.0.81-1Dan Walsh - 2.0.80-1Dan Walsh - 2.0.79-6Dan Walsh - 2.0.79-5Dan Walsh - 2.0.79-4Dan Walsh - 2.0.79-3Dan Walsh - 2.0.79-1Dan Walsh - 2.0.78-5Dan Walsh - 2.0.78-4Dan Walsh - 2.0.78-3Dan Walsh - 2.0.78-2Dan Walsh - 2.0.78-1Fedora Release Engineering - 2.0.77-6Dan Walsh - 2.0.77-5Dan Walsh - 2.0.77-3Dan Walsh - 2.0.77-2Dan Walsh - 2.0.77-1Dan Walsh - 2.0.76-6Dan Walsh l - 2.0.76-5Dan Walsh - 2.0.76-4Ignacio Vazquez-Abrams - 2.0.76-2Dan Walsh - 2.0.76-1Dan Walsh - 2.0.75-2Dan Walsh - 2.0.75-1Dan Walsh - 2.0.73-1Dan Walsh - 2.0.71-6Dan Walsh - 2.0.71-5Dan Walsh - 2.0.71-4Dan Walsh - 2.0.71-3Dan Walsh - 2.0.71-2Dan Walsh - 2.0.71-1Dan Walsh - 2.0.70-1Dan Walsh - 2.0.69-2Dan Walsh - 2.0.69-1Dan Walsh - 2.0.67-4Dan Walsh - 2.0.67-3Dan Walsh - 2.0.67-2Dan Walsh - 2.0.67-1Dan Walsh - 2.0.65-1Dan Walsh - 2.0.64-3Dan Walsh - 2.0.64-2Dan Walsh - 2.0.64-1Dan Walsh - 2.0.61-4Dan Walsh - 2.0.61-3Dan Walsh - 2.0.61-2Dan Walsh - 2.0.61-1Dan Walsh - 2.0.60-1Dan Walsh - 2.0.59-2Dan Walsh - 2.0.59-1Dan Walsh - 2.0.58-1Dan Walsh - 2.0.57-2Dan Walsh - 2.0.57-1Dan Walsh - 2.0.56-1Dan Walsh - 2.0.55-1Dan Walsh - 2.0.53-1Dan Walsh - 2.0.52-1Dan Walsh - 2.0.50-1Dan Walsh - 2.0.49-2Dan Walsh - 2.0.49-1Dan Walsh - 2.0.48-1Dan Walsh - 2.0.47-4Adel Gadllah - 2.0.47-3Dan Walsh - 2.0.47-2Dan Walsh - 2.0.47-1Dan Walsh - 2.0.46-6Dan Walsh - 2.0.46-5Dan Walsh - 2.0.46-4Dan Walsh - 2.0.46-3Dan Walsh - 2.0.46-2Dan Walsh - 2.0.46-1Dan Walsh - 2.0.45-1Dan Walsh - 2.0.43-1Dan Walsh - 2.0.42-1Dan Walsh - 2.0.40-1Dan Walsh - 2.0.37-1Dan Walsh - 2.0.36-1Dan Walsh - 2.0.35-2Dan Walsh - 2.0.35-1Dan Walsh - 2.0.34-3Dan Walsh - 2.0.34-2Dan Walsh - 2.0.34-1Dan Walsh - 2.0.33-2Dan Walsh - 2.0.33-1Dan Walsh - 2.0.31-4Dan Walsh - 2.0.31-3Dan Walsh - 2.0.31-2Dan Walsh - 2.0.30-2Dan Walsh - 2.0.30-1Dan Walsh - 2.0.29-1Dan Walsh - 2.0.24-3Dan Walsh - 2.0.24-2Dan Walsh - 2.0.24-1Dan Walsh - 2.0.23-3Dan Walsh - 2.0.23-2Dan Walsh - 2.0.23-1Dan Walsh - 2.0.22-1Dan Walsh - 2.0.21-2Dan Walsh - 2.0.21-1Dan Walsh - 2.0.18-1Dan Walsh - 2.0.16-1Dan Walsh - 2.0.14-1Dan Walsh - 2.0.13-2Dan Walsh - 2.0.13-1Dan Walsh - 2.0.12-2Dan Walsh - 2.0.12-1Dan Walsh - 2.0.11-1Dan Walsh - 2.0.9-2Dan Walsh - 2.0.9-1Dan Walsh - 2.0.8-1Dan Walsh - 2.0.7-2Dan Walsh - 2.0.7-1Dan Walsh - 2.0.5-2Dan Walsh - 2.0.5-1Dan Walsh - 2.0.4-1Dan Walsh - 2.0.2-1Dan Walsh - 2.0.1-1Dan Walsh - 2.0.0-1Dan Walsh - 1.34.0-2Dan Walsh - 1.34.0-1Dan Walsh - 1.33.6-1Dan Walsh - 1.33.5-1Dan Walsh - 1.33.4-3Dan Walsh - 1.33.4-2Dan Walsh - 1.33.4-1Dan Walsh - 1.33.3-3Dan Walsh - 1.33.3-2Dan Walsh - 1.33.3-1Jeremy Katz - 1.33.2-4Dan Walsh - 1.33.2-3Dan Walsh - 1.33.2-2Dan Walsh - 1.33.2-1Dan Walsh - 1.33.1-2Dan Walsh - 1.33.1-1Dan Walsh - 1.32-1Jesse Keating - 1.30.29-2Dan Walsh - 1.30.29-1Jeremy Katz - 1.30.28-3Dan Walsh - 1.30.28-2Dan Walsh - 1.30.28-1Jeremy Katz - 1.30.27-2Dan Walsh - 1.30.27-1Jesse Keating - 1.20.26-2Dan Walsh - 1.30.25-1Dan Walsh - 1.30.24-1Dan Walsh - 1.30.22-2Dan Walsh - 1.30.22-1Dan Walsh - 1.30.20-1Jeremy Katz - 1.30.19-5Jeremy Katz - 1.30.19-4Dan Walsh 1.30.19-3Dan Walsh 1.30.19-2Dan Walsh 1.30.19-1Dan Walsh 1.30.15-5Dan Walsh 1.30.15-4Dan Walsh 1.30.15-3Dan Walsh 1.30.15-2Dan Walsh 1.30.15-1Dan Walsh 1.30.12-2Dan Walsh 1.30.12-1Dan Walsh 1.30.11-2Dan Walsh 1.30.11-1Dan Walsh 1.30.10-4Dan Walsh 1.30.10-3Dan Walsh 1.30.10-2Dan Walsh 1.30.10-1Dan Walsh 1.30.8-1Dan Walsh 1.30.7-2Dan Walsh 1.30.7-1Dan Walsh 1.30.6-2Dan Walsh 1.30.6-1Dan Walsh 1.30.5-1Dan Walsh 1.30.3-3Dan Walsh 1.30.3-2Dan Walsh 1.30.3-1Dan Walsh 1.30.1-2Dan Walsh 1.30.1-1Dan Walsh 1.30-1Jesse Keating - 1.29.7-1.2Jesse Keating - 1.29.7-1.1Dan Walsh 1.29.7-1Dan Walsh 1.29.6-1Dan Walsh 1.29.5-2Dan Walsh 1.29.5-1Dan Walsh 1.29.4-1Dan Walsh 1.29.3-2Dan Walsh 1.29.3-1Dan Walsh 1.29.2-4Dan Walsh 1.29.2-3Dan Walsh 1.29.2-2Dan Walsh 1.29.2-1Dan Walsh 1.29.1-3Jesse Keating Dan Walsh 1.29.1-1Dan Walsh 1.28-1Dan Walsh 1.27.28-2Dan Walsh 1.27.28-1Dan Walsh 1.27.26-1Dan Walsh 1.27.25-1Dan Walsh 1.27.23-1Dan Walsh 1.27.22-4Dan Walsh 1.27.22-3Dan Walsh 1.27.22-2Dan Walsh 1.27.22-1Dan Walsh 1.27.21-2Dan Walsh 1.27.21-1Dan Walsh 1.27.20-1Dan Walsh 1.27.19-1Dan Walsh 1.27.18-1Dan Walsh 1.27.17-4Dan Walsh 1.27.17-2Dan Walsh 1.27.17-1Dan Walsh 1.27.14-3Dan Walsh 1.27.14-2Dan Walsh 1.27.14-1Dan Walsh 1.27.13-2Dan Walsh 1.27.13-1Dan Walsh 1.27.12-1Dan Walsh 1.27.9-2Dan Walsh 1.27.9-1Dan Walsh 1.27.7-1Dan Walsh 1.27.6-1Dan Walsh 1.27.4-1Dan Walsh 1.27.3-1Dan Walsh 1.27.2-1Dan Walsh 1.27.1-3Dan Walsh 1.27.1-2Dan Walsh 1.26-6Dan Walsh 1.26-5Dan Walsh 1.26-3Dan Walsh 1.26-2Dan Walsh 1.25.7-1Dan Walsh 1.25.6-1Dan Walsh 1.25.5-1Dan Walsh 1.25.4-1Dan Walsh 1.25.3-2Dan Walsh 1.25.3-1Dan Walsh 1.25.2-2Dan Walsh 1.25.2-1Dan Walsh 1.24.2-1Dan Walsh 1.24.1-1Dan Walsh 1.23.11-1Dan Walsh 1.23.10-3Dan Walsh 1.23.10-2Dan Walsh 1.23.10-1Dan Walsh 1.23.8-1Dan Walsh 1.23.7-3Dan Walsh 1.23.7-2Dan Walsh 1.23.7-1Dan Walsh 1.23.6-1Dan Walsh 1.23.5-1Dan Walsh 1.23.4-1Dan Walsh 1.23.2-3Dan Walsh 1.23.2-2Dan Walsh 1.23.2-1Dan Walsh 1.23.1-1Dan Walsh 1.22-1Dan Walsh 1.21.13-1Dan Walsh 1.21.12-1Dan Walsh 1.21.11-2Dan Walsh 1.21.11-1Dan Walsh 1.21.10-3Dan Walsh 1.21.10-1Dan Walsh 1.21.9-2Dan Walsh 1.21.9-1Dan Walsh 1.21.8-1Dan Walsh 1.21.7-1Dan Walsh 1.21.5-1Dan Walsh 1.21.4-1Dan Walsh 1.21.2-1Dan Walsh 1.21.1-3Dan Walsh 1.21.1-2Dan Walsh 1.21.1-1Dan Walsh 1.20.1-3Dan Walsh 1.20.1-2Dan Walsh 1.20.1-1Dan Walsh 1.19.4-1Dan Walsh 1.19.3-3Dan Walsh 1.19.3-2Dan Walsh 1.19.3-1Dan Walsh 1.19.2-1Dan Walsh 1.19.1-6Dan Walsh 1.19.1-4Dan Walsh 1.19.1-2Dan Walsh 1.19.1-1Steve Grubb 1.18.1-5Dan Walsh 1.18.1-4Dan Walsh 1.18.1-3Steve Grubb 1.18.1-2Dan Walsh 1.18.1-1Steve Grubb 1.17.15-2Steve Grubb 1.17.15-2Dan Walsh 1.17.15-1Dan Walsh 1.17.14-1Dan Walsh 1.17.13-3Dan Walsh 1.17.13-2Dan Walsh 1.17.13-1Dan Walsh 1.17.12-2Dan Walsh 1.17.12-1Dan Walsh 1.17.11-1Dan Walsh 1.17.10-1Dan Walsh 1.17.9-2Dan Walsh 1.17.9-1Dan Walsh 1.17.8-2Dan Walsh 1.17.8-1Dan Walsh 1.17.7-1Dan Walsh 1.17.6-1Dan Walsh 1.17.5-1Dan Walsh 1.17.4-1Dan Walsh 1.17.3-1Dan Walsh 1.17.2-1Dan Walsh 1.17.1-1Dan Walsh 1.16.1-1Colin Walters 1.16-1Dan Walsh 1.15.7-1Dan Walsh 1.15.6-1Dan Walsh 1.15.5-1Dan Walsh 1.15.4-1Dan Walsh 1.15.3-2Dan Walsh 1.15.3-1Dan Walsh 1.15.2-1Dan Walsh 1.15.1-3Dan Walsh 1.15.1-2Dan Walsh 1.15.1-1Dan Walsh 1.14.1-1Dan Walsh 1.13.4-1Elliot Lee Dan Walsh 1.13.3-2Dan Walsh 1.13.2-1Dan Walsh 1.13.1-1Dan Walsh 1.12-2Dan Walsh 1.12-1Dan Walsh 1.11.4-1Dan Walsh 1.11.3-1Dan Walsh 1.11.2-1Dan Walsh 1.11-4Dan Walsh 1.11-3Dan Walsh 1.11-2Dan Walsh 1.11-1Dan Walsh 1.10-2Dan Walsh 1.10-1Dan Walsh 1.9-1Dan Walsh 1.8-1Dan Walsh 1.6-6Dan Walsh 1.6-5Dan Walsh 1.6-4Dan Walsh 1.6-3Dan Walsh 1.6-2Elliot Lee Dan Walsh 1.4-11Elliot Lee Dan Walsh 1.4-9Dan Walsh 1.4-8Dan Walsh 1.4-7Dan Walsh 1.4-6Dan Walsh 1.4-5Dan Walsh 1.4-4Dan Walsh 1.4-3Dan Walsh 1.4-2Dan Walsh 1.4-1Dan Walsh 1.3-2Dan Walsh 1.3-1Dan Walsh 1.2-9Dan Walsh 1.2-8Dan Walsh 1.2-7Dan Walsh 1.2-6Dan Walsh 1.2-5Dan Walsh 1.2-4Dan Walsh 1.2-3Dan Walsh 1.2-2Dan Walsh 1.2-1Dan Walsh 1.0-1- Add chcon function to python bindings.* Set errno=EINVAL for invalid contexts from Dan Walsh.- Update to upstream * Show strerror for security_getenforce() by Colin Waters. * Merged selabel database support by KaiGai Kohei. * Modify netlink socket blocking code by KaiGai Kohei.- Update to upstream * Fix from Eric Paris to fix leak on non-selinux systems. * regenerate swig wrappers * pkgconfig fix to respect LIBDIR from Dan Walsh.- Update to upstream * Change the AVC to only audit the permissions specified by the policy, excluding any permissions specified via dontaudit or not specified via auditallow. * Fix compilation of label_file.c with latest glibc headers.- Fix potential doublefree on init- Fix libselinux.pc- Fix man page for selinuxdefcon- Free memory on disabled selinux boxes- Update to upstream * add/reformat man pages by Guido Trentalancia . * Change exception.sh to be called with bash by Manoj Srivastava - Fix selinuxdefcon man page- Update to upstream * Add pkgconfig file from Eamon Walsh.- Update to upstream * Rename and export selinux_reset_config()- Update to upstream * Add exception handling in libselinux from Dan Walsh. This uses a shell script called exception.sh to generate a swig interface file. * make swigify * Make matchpathcon print <> if path not found in fcontext file.- Eliminate -pthread switch in Makefile- Update to upstream * Removal of reference counting on userspace AVC SID's.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- Update to upstream * Reverted Tomas Mraz's fix for freeing thread local storage to avoid pthread dependency. * Removed fini_context_translations() altogether. * Merged lazy init patch from Stephen Smalley based on original patch by Steve Grubb.- Update to upstream * Add per-service seuser support from Dan Walsh. * Let load_policy gracefully handle selinuxfs being mounted from Stephen Smalley. * Check /proc/filesystems before /proc/mounts for selinuxfs from Eric Paris.- Add provices ruby(selinux)- Update to upstream * Fix improper use of thread local storage from Tomas Mraz . * Label substitution support from Dan Walsh. * Support for labeling virtual machine images from Dan Walsh.- Update to upstream * Trim / from the end of input paths to matchpathcon from Dan Walsh. * Fix leak in process_line in label_file.c from Hiroshi Shinji. * Move matchpathcon to /sbin, add matchpathcon to clean target from Dan Walsh. * getdefaultcon to print just the correct match and add verbose option from Dan Walsh.- Update to upstream * deny_unknown wrapper function from KaiGai Kohei. * security_compute_av_flags API from KaiGai Kohei. * Netlink socket management and callbacks from KaiGai Kohei.- Fix Memory Leak- Fix crash in python- Add back in additional interfaces- Add back in av_decision to python swig- Update to upstream * Netlink socket handoff patch from Adam Jackson. * AVC caching of compute_create results by Eric Paris.- Add patch from ajax to accellerate X SELinux - Update eparis patch- Add eparis patch to accellerate Xwindows performance- Fix URL- Add substitute pattern - matchpathcon output <> on ENOENT- Update to upstream * Fix incorrect conversion in discover_class code.- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- Add - selinux_virtual_domain_context_path - selinux_virtual_image_context_path- Throw exeptions in python swig bindings on failures- Fix restorecon python code- Update to upstream- Strip trailing / for matchpathcon- Fix segfault if seusers file does not work- Add new function getseuser which will take username and service and return - seuser and level. ipa will populate file in future. - Change selinuxdefcon to return just the context by default- Rebuild for Python 2.6- Update to Upstream * Allow shell-style wildcards in x_contexts file.- Eamon Walsh Patch - libselinux: allow shell-style wildcarding in X names - Add Restorecon/Install python functions from Luke Macken- Update to Upstream * Correct message types in AVC log messages. * Make matchpathcon -V pass mode from Dan Walsh. * Add man page for selinux_file_context_cmp from Dan Walsh.- Update to Upstream * New man pages from Dan Walsh. * Update flask headers from refpolicy trunk from Dan Walsh.- Fix matchpathcon -V call- Add flask definitions for open, X and nlmsg_tty_audit- Add missing get/setkeycreatecon man pages- Split out utilities- Add missing man page links for [lf]getfilecon- Update to Upstream * Add group support to seusers using %groupname syntax from Dan Walsh. * Mark setrans socket close-on-exec from Stephen Smalley. * Only apply nodups checking to base file contexts from Stephen Smalley.- Update to Upstream * Merge ruby bindings from Dan Walsh. - Add support for Linux groups to getseuserbyname- Allow group handling in getseuser call- Update to Upstream * Handle duplicate file context regexes as a fatal error from Stephen Smalley. This prevents adding them via semanage. * Fix audit2why shadowed variables from Stephen Smalley. * Note that freecon NULL is legal in man page from Karel Zak.- Add ruby support for puppet- Rebuild for new libsepol- Add Karel Zak patch for freecon man page- Update to Upstream * New and revised AVC, label, and mapping man pages from Eamon Walsh. * Add swig python bindings for avc interfaces from Dan Walsh.- Update to Upstream * Fix selinux_file_context_verify() and selinux_lsetfilecon_default() to call matchpathcon_init_prefix if not already initialized. * Add -q qualifier for -V option of matchpathcon and change it to indicate whether verification succeeded or failed via exit status.- libselinux no longer neets to telnet -u in post install- Add sedefaultcon and setconlist commands to dump login context- Update to Upstream * Fixed selinux_set_callback man page. * Try loading the max of the kernel-supported version and the libsepol-supported version when no manipulation of the binary policy is needed from Stephen Smalley. * Fix memory leaks in matchpathcon from Eamon Walsh.- Add Xavior Toth patch for security_id_t in swig- Add avc.h to swig code- Grab the latest policy for the kernel- Update to Upstream * Man page typo fix from Jim Meyering.- Update to Upstream * Changed selinux_init_load_policy() to not warn about a failed mount of selinuxfs if selinux was disabled in the kernel.- Fix matchpathcon memory leak- Update to Upstream * Merged new X label "poly_selection" namespace from Eamon Walsh.- Update to Upstream * Merged reset_selinux_config() for load policy from Dan Walsh.- Reload library on loading of policy to handle chroot- Update to Upstream * Merged avc_has_perm() errno fix from Eamon Walsh.- Update to Upstream * Regenerated Flask headers from refpolicy flask definitions.- Update to Upstream * Merged compute_member AVC function and manpages from Eamon Walsh. * Provide more error reporting on load policy failures from Stephen Smalley.- Update to Upstream * Merged new X label "poly_prop" namespace from Eamon Walsh.- Update to Upstream * Disable setlocaldefs if no local boolean or users files are present from Stephen Smalley. * Skip userspace preservebools processing for Linux >= 2.6.22 from Stephen Smalley.- Update to Upstream * Merged fix for audit2why from Dan Walsh.- Fix audit2why to grab latest policy versus the one selected by the kernel* Merged audit2why python binding from Dan Walsh.* Merged updated swig bindings from Dan Walsh, including typemap for pid_t.- Update to use libsepol-static library- Move libselinux.a to -static package - Spec cleanups- Put back libselinux.a- Fix memory references in audit2why and change to use tuples - Update to Upstream * Fix for the avc: granted null message bug from Stephen Smalley.- Fix __init__.py specification- Add audit2why python bindings- Add pid_t typemap for swig bindings- smp_mflag- Fix spec file caused by spec review- Upgrade to upstream * matchpathcon(8) man page update from Dan Walsh.- Upgrade to upstream * dlopen libsepol.so.1 rather than libsepol.so from Stephen Smalley. * Based on a suggestion from Ulrich Drepper, defer regex compilation until we have a stem match, by Stephen Smalley. * A further optimization would be to defer regex compilation until we have a complete match of the constant prefix of the regex - TBD.- Upgrade to upstream * Regenerated Flask headers from policy.- Upgrade to upstream * AVC enforcing mode override patch from Eamon Walsh. * Aligned attributes in AVC netlink code from Eamon Walsh. - Move libselinux.so back into devel package, procps has been fixed- Upgrade to upstream * Merged refactored AVC netlink code from Eamon Walsh. * Merged new X label namespaces from Eamon Walsh. * Bux fix and minor refactoring in string representation code.- Upgrade to upstream * Merged selinux_get_callback, avc_open, empty string mapping from Eamon Walsh.- Upgrade to upstream * Fix segfault resulting from missing file_contexts file.- Fix segfault on missing file_context file- Upgrade to upstream * Make netlink socket close-on-exec to avoid descriptor leakage from Dan Walsh. * Pass CFLAGS when using gcc for linking from Dennis Gilmore.- Add sparc patch to from Dennis Gilmore to build on Sparc platform- Remove leaked file descriptor- Upgrade to latest from NSA * Fix selabel option flag setting for 64-bit from Stephen Smalley.- Change matchpatcon to use syslog instead of syserror- Upgrade to latest from NSA * Re-map a getxattr return value of 0 to a getfilecon return value of -1 with errno EOPNOTSUPP from Stephen Smalley. * Fall back to the compat code for security_class_to_string and security_av_perm_to_string from Stephen Smalley. * Fix swig binding for rpm_execcon from James Athey.- Apply James Athway patch to fix rpm_execcon python binding- Move libselinux.so back into main package, breaks procps- Upgrade to upstream * Fix file_contexts.homedirs path from Todd Miller.- Remove requirement on setransd, Moved to selinux-policy-mls- Move libselinux.so into devel package - Upgrade to upstream * Fix segfault resulting from uninitialized print-callback pointer. * Added x_contexts path function patch from Eamon Walsh. * Fix build for EMBEDDED=y from Yuichi Nakamura. * Fix markup problems in selinux man pages from Dan Walsh.- Upgrade to upstream * Updated version for stable branch. * Added x_contexts path function patch from Eamon Walsh. * Fix build for EMBEDDED=y from Yuichi Nakamura. * Fix markup problems in selinux man pages from Dan Walsh. * Updated av_permissions.h and flask.h to include new nscd permissions from Dan Walsh. * Added swigify to top-level Makefile from Dan Walsh. * Fix for string_to_security_class segfault on x86_64 from Stephen Smalley.- Apply Steven Smalley patch to fix segfault in string_to_security_class- Fix matchpathcon to set default myprintf- Upgrade to upstream * Fix for getfilecon() for zero-length contexts from Stephen Smalley.- Update to match flask/access_vectors in policy- Fix man page markup lanquage for translations- Fix semanage segfault on x86 platform- Upgrade to upstream * Labeling and callback interface patches from Eamon Walsh.- Refactored swig- Upgrade to upstream * Class and permission mapping support patches from Eamon Walsh. * Object class discovery support patches from Chris PeBenito. * Refactoring and errno support in string representation code.- Upgrade to upstream * Merged patch to reduce size of libselinux and remove need for libsepol for embedded systems from Yuichi Nakamura. This patch also turns the link-time dependency on libsepol into a runtime (dlopen) dependency even in the non-embedded case. 2.0.17 2007-05-31 * Updated Lindent script and reindented two header files.- Upgrade to upstream * Merged additional swig python bindings from Dan Walsh. * Merged helpful message when selinuxfs mount fails patch from Dax Kelson.- Upgrade to upstream * Merged build fix for avc_internal.c from Joshua Brindle.- Add get_context_list funcitions to swig file- Upgrade to upstream * Merged rpm_execcon python binding fix, matchpathcon man page fix, and getsebool -a handling for EACCES from Dan Walsh.- Add missing interface- Upgrade to upstream * Merged support for getting initial contexts from James Carter.- Upgrade to upstream * Merged userspace AVC patch to follow kernel's behavior for permissive mode in caching previous denials from Eamon Walsh. * Merged sidput(NULL) patch from Eamon Walsh.- Make rpm_exec swig work- Upgrade to upstream * Merged class/av string conversion and avc_compute_create patch from Eamon Walsh.- Upgrade to upstream * Merged fix for avc.h #include's from Eamon Walsh.- Add stdint.h to avc.h* Merged patch to drop support for CACHETRANS=0 config option from Steve Grubb. * Merged patch to drop support for old /etc/sysconfig/selinux and /etc/security policy file layout from Steve Grubb.- Do not fail on permission denied in getsebool- Upgrade to upstream * Merged init_selinuxmnt() and is_selinux_enabled() improvements from Steve Grubb.- Upgrade to upstream * Removed sending of setrans init message. * Merged matchpathcon memory leak fix from Steve Grubb.- Upgrade to upstream * Merged more swig initializers from Dan Walsh.- Upgrade to upstream * Merged patch from Todd Miller to convert int types over to C99 style.* Merged patch from Todd Miller to remove sscanf in matchpathcon.c because of the use of the non-standard format (original patch changed for style). * Merged patch from Todd Miller to fix memory leak in matchpathcon.c.- Add context function to python to split context into 4 parts- Upgrade to upstream * Updated version for stable branch.- Upgrade to upstream * Merged man page updates to make "apropos selinux" work from Dan Walsh.- Upgrade to upstream * Merged getdefaultcon utility from Dan Walsh.- Add Ulrich NSCD__GETSERV and NSCD__SHMEMGRP for Uli- Add reference to selinux man page in all man pages to make apropos work Resolves: # 217881- Upstream wanted some minor changes, upgrading to keep api the same - Upgrade to upstream * Merged selinux_check_securetty_context() and support from Dan Walsh. Resolves: #200110- Cleanup patch- Add securetty handling Resolves: #200110- Upgrade to upstream * Merged patch for matchpathcon utility to use file mode information when available from Dan Walsh.- rebuild against python 2.5- Fix matchpathcon to lstat files- Update man page- Upgrade to upstream- Add James Antill patch for login verification of MLS Levels - MLS ragnes need to be checked, Eg. login/cron. This patch adds infrastructure.- Upgrade to latest from NSA * Merged updated flask definitions from Darrel Goeddel. This adds the context security class, and also adds the string definitions for setsockcreate and polmatch.- Upgrade to latest from NSA * Updated version for release.- rebuilt for unwind info generation, broken in gcc-4.1.1-21- Upgrade to latest from NSA * Merged av_permissions.h update from Steve Grubb, adding setsockcreate and polmatch definitions.- really make -devel depend on libsepol-devel- Add sgrubb patch for polmatch- Upgrade to latest from NSA * Merged patch from Steve Smalley to fix SIGPIPE in setrans_client- have -devel require libsepol-devel- Upgrade to latest from NSA * Merged patch to not log avc stats upon a reset from Steve Grubb. * Applied patch to revert compat_net setting upon policy load. * Merged file context homedir and local path functions from Chris PeBenito.- rebuilt with latest binutils to pick up 64K -z commonpagesize on ppc* (#203001)- Upgrade to latest from NSA * Merged file context homedir and local path functions from Chris PeBenito. * Rework functions that access /proc/pid/attr to access the per-thread nodes, and unify the code to simplify maintenance.- Upgrade to latest from NSA * Merged return value fix for *getfilecon() from Dan Walsh. * Merged sockcreate interfaces from Eric Paris.- Fix translation return codes to return size of buffer- Upgrade to latest from NSA * Merged no-tls-direct-seg-refs patch from Jeremy Katz. * Merged netfilter_contexts support patch from Chris PeBenito.- Upgrade to latest from NSA * Merged context_*_set errno patch from Jim Meyering.- only build non-fpic objects with -mno-tls-direct-seg-refs- build with -mno-tls-direct-seg-refs on x86 to avoid triggering segfaults with xen (#200783)- Rebuild for new gcc- Fix libselinux to not telinit during installs- Upgrade to latest from NSA * Lindent. * Merged {get,set}procattrcon patch set from Eric Paris. * Merged re-base of keycreate patch originally by Michael LeMay from Eric Paris. * Regenerated Flask headers from refpolicy. * Merged patch from Dan Walsh with: - Added selinux_file_context_{cmp,verify}. - Added selinux_lsetfilecon_default. - Delay translation of contexts in matchpathcon.- Yet another change to matchpathcon- Turn off error printing in library. Need to compile with DEBUG to get it back- Fix error reporting of matchpathcon- Add function to compare file context on disk versus contexts in file_contexts file.- Upgrade to latest from NSA * Merged patch from Dan Walsh with: * Added selinux_getpolicytype() function. * Modified setrans code to skip processing if !mls_enabled. * Set errno in the !selinux_mnt case. * Allocate large buffers from the heap, not on stack. Affects is_context_customizable, selinux_init_load_policy, and selinux_getenforcemode.- Add selinux_getpolicytype()- Upgrade to latest from NSA * Merged !selinux_mnt checks from Ian Kent.- Check for selinux_mnt == NULL* Merged matchmediacon and trans_to_raw_context fixes from Serge Hallyn.- Remove getseuser- Bump requires to grab latest libsepol- Add BuildRequires for swig- Upgrade to latest from NSA * Merged simple setrans client cache from Dan Walsh. Merged avcstat patch from Russell Coker. * Modified selinux_mkload_policy() to also set /selinux/compat_net appropriately for the loaded policy.- More fixes for translation cache - Upgrade to latest from NSA * Added matchpathcon_fini() function to free memory allocated by matchpathcon_init().- Add simple cache to improve translation speed- Upgrade to latest from NSA * Merged setrans client cleanup patch from Steve Grubb.- Add Russell's AVC patch to handle large numbers- Upgrade to latest from NSA * Merged getfscreatecon man page fix from Dan Walsh. * Updated booleans(8) man page to drop references to the old booleans file and to note that setsebool can be used to set the boot-time defaults via -P.- Upgrade to latest from NSA * Merged fix warnings patch from Karl MacMillan. * Merged setrans client support from Dan Walsh. This removes use of libsetrans. * Merged patch to eliminate use of PAGE_SIZE constant from Dan Walsh. * Merged swig typemap fixes from Glauber de Oliveira Costa.- Change the way translations work, Use setransd/remove libsetrans- Add selinuxswig fixes - Stop using PAGE_SIZE and start using sysconf(_SC_PAGE_SIZE)- Upgrade to latest from NSA * Added distclean target to Makefile. * Regenerated swig files. * Changed matchpathcon_init to verify that the spec file is a regular file. * Merged python binding t_output_helper removal patch from Dan Walsh.- Fix python bindings for matchpathcon - Fix booleans man page* Merged Makefile PYLIBVER definition patch from Dan Walsh.- Make some fixes so it will build on RHEL4 - Upgrade to latest from NSA * Updated version for release. * Altered rpm_execcon fallback logic for permissive mode to also handle case where /selinux/enforce is not available.- bump again for double-long bug on ppc(64)- rebuilt for new gcc4.1 snapshot and glibc changes- Upgrade to latest from NSA * Merged install-pywrap Makefile patch from Joshua Brindle.- Upgrade to latest from NSA * Merged pywrap Makefile patch from Dan Walsh.- Split out pywrap in Makefile- Upgrade to latest from NSA * Added getseuser test program.- Upgrade to latest from NSA * Added format attribute to myprintf in matchpathcon.c and removed obsoleted rootlen variable in init_selinux_config().- Build with new libsepol- Upgrade to latest from NSA * Merged several fixes and improvements from Ulrich Drepper (Red Hat), including: - corrected use of getline - further calls to __fsetlocking for local files - use of strdupa and asprintf - proper handling of dirent in booleans code - use of -z relro - several other optimizations * Merged getpidcon python wrapper from Dan Walsh (Red Hat).- Add build requires line for libsepol-devel- Fix swig call for getpidcon- Move libselinux.so to base package- Upgrade to latest from NSA * Merged call to finish_context_translations from Dan Walsh. This eliminates a memory leak from failing to release memory allocated by libsetrans.- update to latest libsetrans - Fix potential memory leak- rebuilt- Update to never version * Merged patch for swig interfaces from Dan Walsh.- Update to never version- Fix some of the python swig objects- Update to latest from NSA * Added MATCHPATHCON_VALIDATE flag for set_matchpathcon_flags() and modified matchpathcon implementation to make context validation/ canonicalization optional at matchpathcon_init time, deferring it to a successful matchpathcon by default unless the new flag is set by the caller. * Added matchpathcon_init_prefix() interface, and reworked matchpathcon implementation to support selective loading of file contexts entries based on prefix matching between the pathname regex stems and the specified path prefix (stem must be a prefix of the specified path prefix).- Update to latest from NSA * Change getsebool to return on/off instead of active/inactive- Update to latest from NSA * Added -f file_contexts option to matchpathcon util. Fixed warning message in matchpathcon_init(). * Merged Makefile python definitions patch from Dan Walsh.- Update to latest from NSA * Merged swigify patch from Dan Walsh.- Separate out libselinux-python bindings into separate rpm- Read libsetrans requirement- Add python bindings- Update to latest from NSA * Merged make failure in rpm_execcon non-fatal in permissive mode patch from Ivan Gyurdiev.- Remove requirement for libsetrans- Update to latest from NSA * Added MATCHPATHCON_NOTRANS flag for set_matchpathcon_flags() and modified matchpathcon_init() to skip context translation if it is set by the caller.- Update to latest from NSA * Added security_canonicalize_context() interface and set_matchpathcon_canoncon() interface for obtaining canonical contexts. Changed matchpathcon internals to obtain canonical contexts by default. Provided fallback for kernels that lack extended selinuxfs context interface. - Patch to not translate mls when calling setfiles- Update to latest from NSA * Merged seusers parser changes from Ivan Gyurdiev. * Merged setsebool to libsemanage patch from Ivan Gyurdiev. * Changed seusers parser to reject empty fields.- Update to latest from NSA * Merged seusers empty level handling patch from Jonathan Kim (TCS).- Rebuild for latest libsepol- Rebuild for latest libsepol- Change default to __default__- Change default to __default__- Add selinux_translations_path- Update to latest from NSA * Merged selinux_path() and selinux_homedir_context_path() functions from Joshua Brindle.- Need to check for /sbin/telinit- Update to latest from NSA * Merged fixes for make DESTDIR= builds from Joshua Brindle.- Update to latest from NSA * Merged get_default_context_with_rolelevel and man pages from Dan Walsh (Red Hat). * Updated call to sepol_policydb_to_image for sepol changes. * Changed getseuserbyname to ignore empty lines and to handle no matching entry in the same manner as no seusers file.- Tell init to reexec itself in post script- Update to latest from NSA * Changed selinux_mkload_policy to try downgrading the latest policy version available to the kernel-supported version. * Changed selinux_mkload_policy to fall back to the maximum policy version supported by libsepol if the kernel policy version falls outside of the supported range.- Update to latest from NSA * Changed getseuserbyname to fall back to the Linux username and NULL level if seusers config file doesn't exist unless REQUIRESEUSERS=1 is set in /etc/selinux/config. * Moved seusers.conf under $SELINUXTYPE and renamed to seusers.- Update to latest from NSA * Added selinux_init_load_policy() function as an even higher level interface for the initial policy load by /sbin/init. This obsoletes the load_policy() function in the sysvinit-selinux.patch. * Added selinux_mkload_policy() function as a higher level interface for loading policy than the security_load_policy() interface.- Update to latest from NSA * Merged fix for matchpathcon (regcomp error checking) from Johan Fischer. Also added use of regerror to obtain the error string for inclusion in the error message.- Update to latest from NSA * Changed getseuserbyname to not require (and ignore if present) the MLS level in seusers.conf if MLS is disabled, setting *level to NULL in this case.- Update to latest from NSA * Merged getseuserbyname patch from Dan Walsh.- Fix patch to satisfy upstream- Update to latest from NSA - Add getseuserbyname- Fix patch call- Fix strip_con call- Go back to original libsetrans code- Eliminate forth param from mls context when mls is not enabled.- Update from NSA * Merged modified form of patch to avoid dlopen/dlclose by the static libselinux from Dan Walsh. Users of the static libselinux will not have any context translation by default.- Update from NSA * Added public functions to export context translation to users of libselinux (selinux_trans_to_raw_context, selinux_raw_to_trans_context).- Update from NSA * Remove special definition for context_range_set; use common code.- Update from NSA * Hid translation-related symbols entirely and ensured that raw functions have hidden definitions for internal use. * Allowed setting NULL via context_set* functions. * Allowed whitespace in MLS component of context. * Changed rpm_execcon to use translated functions to workaround lack of MLS level on upgraded systems.- Allow set_comp on unset ranges* Merged context translation patch, originally by TCS, with modifications by Dan Walsh (Red Hat).- Apply translation patch- Update from NSA * Merged several fixes for error handling paths in the AVC sidtab, matchpathcon, booleans, context, and get_context_list code from Serge Hallyn (IBM). Bugs found by Coverity. * Removed setupns; migrated to pam. * Merged patches to rename checkPasswdAccess() from Joshua Brindle. Original symbol is temporarily retained for compatibility until all callers are updated.- Update makefiles- Update from NSA * Merged security_setupns() from Chad Sellers. - fix selinuxenabled man page- Update from NSA * Merged avcstat and selinux man page from Dan Walsh. * Changed security_load_booleans to process booleans.local even if booleans file doesn't exist.- Fix avcstat to clear totals- Add info to man page- Update from NSA * Merged set_selinuxmnt patch from Bill Nottingham (Red Hat). * Rewrote get_ordered_context_list and helpers, including changing logic to allow variable MLS fields.- Update from NSA- Add backin matchpathcon- Fix selinux_policy_root man page- Change assert(selinux_mnt) to if (!selinux_mnt) return -1;- Update from NSA * Fixed bug in matchpathcon_filespec_destroy.- Update from NSA * Fixed bug in rpm_execcon error handling path.- Update from NSA * Merged fix for set_matchpathcon* functions from Andreas Steinmetz. * Merged fix for getconlist utility from Andreas Steinmetz.- Update from NSA- Better handling of booleans- Update from NSA * Merged destructors patch from Tomas Mraz.- Update from NSA * Added set_matchpathcon_flags() function for setting flags controlling operation of matchpathcon. MATCHPATHCON_BASEONLY means only process the base file_contexts file, not file_contexts.homedirs or file_contexts.local, and is for use by setfiles -c. * Updated matchpathcon.3 man page.- Update from NSA- Update from NSA * Fixed bug in matchpathcon_filespec_add() - failure to clear fl_head.- Update from NSA * Changed matchpathcon_common to ignore any non-format bits in the mode.- Default matchpathcon to regular files if the user specifies a mode- Update from NSA * Merged several fixes from Ulrich Drepper.- Fix matchpathcon on eof.- Update from NSA * Merged matchpathcon patch for file_contexts.homedir from Dan Walsh. * Added selinux_users_path() for path to directory containing system.users and local.users.- Process file_context.homedir- Update from NSA * Changed relabel Makefile target to use restorecon.- Update from NSA * Regenerated av_permissions.h.- Update from NSA * Modified avc_dump_av to explicitly check for any permissions that cannot be mapped to string names and display them as a hex value. * Regenerated av_permissions.h.- Update from NSA * Generalized matchpathcon internals, exported more interfaces, and moved additional code from setfiles into libselinux so that setfiles can directly use matchpathcon.- Update from NSA * Prevent overflow of spec array in matchpathcon. * Fixed several uses of internal functions to avoid relocations. * Changed rpm_execcon to check is_selinux_enabled() and fallback to a regular execve if not enabled (or unable to determine due to a lack of /proc, e.g. chroot'd environment).- Update from NSA * Merged minor fix for avcstat from Dan Walsh.- rpmexeccon should not fail in permissive mode.- fix printf in avcstat- Update from NSA- Modify matchpathcon to also process file_contexts.local if it exists- Add is_customizable_types function call- Update to latest from upstream * Just changing version number to match upstream- Update to latest from upstream * Changed matchpathcon to return -1 with errno ENOENT for <> entries, and also for an empty file_contexts configuration.- Fix link devel libraries- Fix unitialized variable in avcstat.c- Upgrade to upstream * Removed some trivial utils that were not useful or redundant. * Changed BINDIR default to /usr/sbin to match change in Fedora. * Added security_compute_member. * Added man page for setcon.- Upgrade to upstream- Add avcstat program- Add lots of missing man pages- Fix output of getsebool.- Update from upstream, fix setsebool -P segfault- Add a patch from upstream. Fixes signed/unsigned issues, and incomplete structure copy.- More fixes from sgrubb, better syslog- Have setsebool and togglesebool log changes to syslog- Add patch to make setsebool update bool on disk - Make togglesebool have a rollback capability in case it blows up inflight- Upgrade to latest from NSA- Changed the location of the utilities to /usr/sbin since normal users can't use them anyways.- Updated various utilities, removed utilities that are for testing, added man pages.- Add -g flag to make - Upgrade to latest from NSA * Added rpm_execcon.- Upgrade to latest from NSA * Merged setenforce and removable context patch from Dan Walsh. * Merged build fix for alpha from Ulrich Drepper. * Removed copyright/license from selinux_netlink.h - definitions only.- Change setenforce to accept Enforcing and Permissive- Add alpha patch- Upgrade to latest from NSA- Add selinux_removable_context_path- Update from NSA * Add matchmediacon- Update from NSA * Merged in matchmediacon changes.- Update from NSA * Regenerated headers for new nscd permissions.- Add matchmediacon- Update from NSA * Added get_default_context_with_role.- Clean up spec file * Patch from Matthias Saou- Update from NSA * Added set_matchpathcon_printf.- Update from NSA * Reworked av_inherit.h to allow easier re-use by kernel.- Add strcasecmp in selinux_config - Update from NSA * Changed avc_has_perm_noaudit to not fail on netlink errors. * Changed avc netlink code to check pid based on patch by Steve Grubb. * Merged second optimization patch from Ulrich Drepper. * Changed matchpathcon to skip invalid file_contexts entries. * Made string tables private to libselinux. * Merged strcat->stpcpy patch from Ulrich Drepper. * Merged matchpathcon man page from Dan Walsh. * Merged patch to eliminate PLTs for local syms from Ulrich Drepper. * Autobind netlink socket. * Dropped compatibility code from security_compute_user. * Merged fix for context_range_set from Chad Hanson. * Merged allocation failure checking patch from Chad Hanson. * Merged avc netlink error message patch from Colin Walters.- Update from NSA * Merged second optimization patch from Ulrich Drepper. * Changed matchpathcon to skip invalid file_contexts entries. * Made string tables private to libselinux. * Merged strcat->stpcpy patch from Ulrich Drepper. * Merged matchpathcon man page from Dan Walsh. * Merged patch to eliminate PLTs for local syms from Ulrich Drepper. * Autobind netlink socket. * Dropped compatibility code from security_compute_user. * Merged fix for context_range_set from Chad Hanson. * Merged allocation failure checking patch from Chad Hanson. * Merged avc netlink error message patch from Colin Walters.- Update from NSA - Add optflags- Update from NSA- Add matchpathcon man page - Latest from NSA * Merged patch to eliminate PLTs for local syms from Ulrich Drepper. * Autobind netlink socket. * Dropped compatibility code from security_compute_user. * Merged fix for context_range_set from Chad Hanson. * Merged allocation failure checking patch from Chad Hanson. * Merged avc netlink error message patch from Colin Walters.- Latest from NSA * Autobind netlink socket. * Dropped compatibility code from security_compute_user. * Merged fix for context_range_set from Chad Hanson. * Merged allocation failure checking patch from Chad Hanson. * Merged avc netlink error message patch from Colin Walters.- Latest from NSA- New upstream version- Latest from Upstream- Fix man pages- Latest from Upstream- Latest from Upstream- Add man page for boolean functions and SELinux- Latest from NSA- Latest from NSA- uppercase getenforce returns, to make them match system-config-securitylevel- Remove old path patch- Update to latest from NSA - Add fix to only get old path if file_context file exists in old location- Update to latest from NSA- add nlclass patch - Update to latest from NSA- rebuilt- Fix selinux_config to break once it finds SELINUXTYPE.-Update with latest from NSA- Change to use new policy mechanism- add man patch- Update with latest from NSA- Update with latest from NSA- Add changes for relaxed policy - Update to match NSA- Add relaxed policy changes- Sync with NSA- Remove requires glibc>2.3.4- Fix selinuxenabled man page.- Upgrade to 1.11- Add memleaks patch- Upgrade to latest from NSA and add more man pages- Update to match NSA - Cleanup some man pages- Upgrade to latest from NSA- Add Russell's Man pages- Change getenforce to also check is_selinux_enabled- Add ownership to /usr/include/selinux- fix location of file_contexts file.- Fix matchpathcon to use BUFSIZ- rebuilt- add matchpathcon- rebuilt- Add rootok patch- Updated getpeernam patch- Add getpeernam patch- Add getpeercon patch- Put mntpoint patch, because found fix for SysVinit- Add remove mntpoint patch, because it breaks SysVinit- Add mntpoint patch for SysVinit- Add -r -u -t to getcon- Upgrade to latest from NSA- Fix x86_64 build- Latest tarball from NSA.- Update with latest changes from NSA- Change location of .so file- Break out into development library- Move location of libselinux.so to /lib- Add selinuxenabled patch- Update with final NSA 1.2 sources.- Update with latest from NSA.- Fix to build on x86_64- update for version 1.2- Initial version                                                                                                                                                              ?@ABCDEFGLKyupkzhontr{~|iw}qlsmvjx2.0.942.0.94-2.fc132.0.94-2.fc13selinuxav_permissions.havc.hcontext.hflask.hget_context_list.hget_default_type.hlabel.hselinux.hlibselinux.solibselinux.pcavc_add_callback.3.gzavc_audit.3.gzavc_av_stats.3.gzavc_cache_stats.3.gzavc_cleanup.3.gzavc_compute_create.3.gzavc_compute_member.3.gzavc_context_to_sid.3.gzavc_destroy.3.gzavc_entry_ref_init.3.gzavc_get_initial_context.3.gzavc_get_initial_sid.3.gzavc_has_perm.3.gzavc_has_perm_noaudit.3.gzavc_init.3.gzavc_netlink_acquire_fd.3.gzavc_netlink_check_nb.3.gzavc_netlink_close.3.gzavc_netlink_loop.3.gzavc_netlink_open.3.gzavc_netlink_release_fd.3.gzavc_open.3.gzavc_reset.3.gzavc_sid_stats.3.gzavc_sid_to_context.3.gzcheckPasswdAccess.3.gzcontext_free.3.gzcontext_new.3.gzcontext_range_get.3.gzcontext_range_set.3.gzcontext_role_get.3.gzcontext_role_set.3.gzcontext_type_get.3.gzcontext_type_set.3.gzcontext_user_get.3.gzcontext_user_set.3.gzfgetfilecon.3.gzfini_selinuxmnt.3.gzfreecon.3.gzfreeconary.3.gzfsetfilecon.3.gzget_default_context.3.gzget_default_context_with_level.3.gzget_default_context_with_role.3.gzget_default_context_with_rolelevel.3.gzget_default_type.3.gzget_ordered_context_list.3.gzget_ordered_context_list_with_level.3.gzgetcon.3.gzgetexeccon.3.gzgetfilecon.3.gzgetfscreatecon.3.gzgetkeycreatecon.3.gzgetpeercon.3.gzgetpidcon.3.gzgetprevcon.3.gzgetseuserbyname.3.gzgetsockcreatecon.3.gzinit_selinuxmnt.3.gzis_context_customizable.3.gzis_selinux_enabled.3.gzis_selinux_mls_enabled.3.gzlgetfilecon.3.gzlsetfilecon.3.gzmanual_user_enter_context.3.gzmatchmediacon.3.gzmatchpathcon.3.gzmatchpathcon_checkmatches.3.gzmatchpathcon_filespec_add.3.gzmatchpathcon_filespec_destroy.3.gzmatchpathcon_filespec_eval.3.gzmatchpathcon_fini.3.gzmatchpathcon_index.3.gzmatchpathcon_init.3.gzprint_access_vector.3.gzquery_user_context.3.gzrpm_execcon.3.gzsecurity_av_perm_to_string.3.gzsecurity_av_string.3.gzsecurity_check_context.3.gzsecurity_class_to_string.3.gzsecurity_commit_booleans.3.gzsecurity_compute_av.3.gzsecurity_compute_av_flags.3.gzsecurity_compute_create.3.gzsecurity_compute_member.3.gzsecurity_compute_relabel.3.gzsecurity_compute_user.3.gzsecurity_deny_unknown.3.gzsecurity_disable.3.gzsecurity_get_boolean_active.3.gzsecurity_get_boolean_names.3.gzsecurity_get_boolean_pending.3.gzsecurity_get_initial_context.3.gzsecurity_getenforce.3.gzsecurity_load_booleans.3.gzsecurity_load_policy.3.gzsecurity_mkload_policy.3.gzsecurity_policyvers.3.gzsecurity_set_boolean.3.gzsecurity_setenforce.3.gzselabel_close.3.gzselabel_lookup.3.gzselabel_open.3.gzselabel_stats.3.gzselinux_binary_policy_path.3.gzselinux_booleans_path.3.gzselinux_check_passwd_access.3.gzselinux_check_securetty_context.3.gzselinux_contexts_path.3.gzselinux_default_context_path.3.gzselinux_default_type_path.3.gzselinux_failsafe_context_path.3.gzselinux_file_context_cmp.3.gzselinux_file_context_homedir_path.3.gzselinux_file_context_local_path.3.gzselinux_file_context_path.3.gzselinux_file_context_verify.3.gzselinux_getenforcemode.3.gzselinux_getpolicytype.3.gzselinux_homedir_context_path.3.gzselinux_lsetfilecon_default.3.gzselinux_media_context_path.3.gzselinux_netfilter_context_path.3.gzselinux_path.3.gzselinux_policy_root.3.gzselinux_removable_context_path.3.gzselinux_securetty_types_path.3.gzselinux_set_callback.3.gzselinux_set_mapping.3.gzselinux_user_contexts_path.3.gzselinux_usersconf_path.3.gzselinux_x_context_path.3.gzset_matchpathcon_flags.3.gzset_matchpathcon_invalidcon.3.gzset_matchpathcon_printf.3.gzset_selinuxmnt.3.gzsetcon.3.gzsetexeccon.3.gzsetfilecon.3.gzsetfscreatecon.3.gzsetkeycreatecon.3.gzsetsockcreatecon.3.gzsidget.3.gzsidput.3.gzstring_to_av_perm.3.gzstring_to_security_class.3.gz/usr/include//usr/include/selinux//usr/lib//usr/lib/pkgconfig//usr/share/man/man3/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnuASCII textdirectorypkgconfig filesymbolic link to `../../lib/libselinux.so.1'troff or preprocessor input text (gzip compressed data, from Unix, max compression)RPRR?p7zXZ !PH6]"k%]dh-;)`&KՖ/`9~*5j|<@ic_|%!+Yn(;\kcQ7aѐ]%NI~Nan6t RKވa ?9ZDeL.ɪXPDĢ@+q6hr/ˣHBIt%t2@. ]%XA; /#٩JLRXh8[% tΑS]' 5蜶4@A8A{x[%3$omP>pԶ ޿͹]*R#an"o!1Uݾ]?E0C^+F%K} = NM8i#AU[0FjQ]=N wٛk60d42+:EHkF7YV'ufFܐ%N[-٦nT7@@"gdgO+Ƌho}+}|Jx.D{&_7NGlY틆]4hlq3]V52o\<X(Oޑ6I)K+LFzLgFOt~ml HdIWHB*Ǹ>ch2td3TJЄtڼ737aT0 1*j + 4Ϩ38ٝrӤn ME]dK2n ݗ_A*M:LTN(W2xu119M /%Tq<Ϝ30 kʇz~A+r&)bdFNҷp0WtE9.[#ϣI?ϵX+tG[r{J.8sG mv"*sPZր>?zmZ1C3 JOt6`hL8Mڱzא uH'gobJC׭Lc)WebMQ<~D ٌʒ!"DQL_&輹fZ|.O 5ThPŖ0¹R6QQ/}_~Z_t\mcj*IIՊwRz[; Hq`J)M%gл9QN7ŗYTBrU1:#7!rPv,DQ33^P}"ń6èVev$pg= I˿ww- C | #&Vw&dyק/3 t摜.ʡk.D  r"C$KktEp,_׫I7d-/4Xu߰>h* A/*.cI] :W׍|DJ{1Gfd>OC^ǩ✶h_H Vk;gS7*{IC^jaAC!B^+UInYzEO3SgȠ&ȝa+G,M5`ې U_jJȑ6obs׋x}~ 4\a>>٫Yx:IcKV_yE@^.}ۚҗʕ jz uũJ2C}4śp`"t`+ߣѷLu3?3z[6g:`\e*\vG-T鼗xo Wn-~t߃ǎAǀeuA@DMbЇ9ڭ20L } TVn&ب\jV⋘)9N++#5GRĔWbs- xM ?dXM`-*W.&- wߛBpEz'_jUywv &"L>n)ď[t^Yj'س? M3 V7ƍ8=/ʏ> qhI3DRpF}?Z°Ж0a#b:G~fv^ @!ۯ/h't4)"D/N'͘񢏥~ 1ԫvQ?^/d H6q#oA -R'&2ԅ. &Tod\;莮nv(o㹅g?— [x;mALF=m[) J!e± O;E{jK9S~I#62Qfݹ#E,9q0]x C'8vMcĠgU-ūl\kr5e#⬀GF/caGW_B0Qk41?I0w `m81V(#g kWa[$:xnMPu p䀎E>\8y&˽Z`3c~xhjj"3d%cis~Wc "(Ȋ:vanm\!|ErP /_չ`7ÈmD@L[N[yE` y%@Yg[TV]??b* Sux}6`}=܆&:|Ҭ%n3j"#4o;7IMc/ Rد@)2.ѓUvRv̎: sLfzx+yTn @i󈻬"a%%kBI"eO|**u-aNEy;jZFHqyؓP>'%L_nMmZZkQ,ljܩkj֜sB-DDK<01%dOrhɩ'W #wa xsL@PuoЩwM~ѕ̇#u0?FX7 D>-A`oS@: wo R(mse iJ_r/ܜwamQ/fdxP,0Ez~h԰$+}L+.4 'd`G$$?5#GB'MQ>RHF8{949jr 2a5JݎV=iFawSC)ߨ“AT\Җt}nW:,FE0ۢ 7Uom$ĂƮ a \qb0%hIÞe}\~%'= c-Vj'ZsPW aHeṌ%EJmN$/kOFIp0xQlΥwzʳ"!nb?OU߼t|R3kM@I?B$wli}ra>7[%tf9WS @²MxEÇ]JR9c/Qӥ4]V2.ukD.Ґ0ƮnVԅmFz3TZE H#ţ*%:Yƥn,^ ^}|n=?濲=-E 4g;T{cC &7rrk]|i= *WD!d+ͩpˑk%G,jũڌlurH4t5\!,(/֢ ҶS@+ȡ~N5ӯȓi8R + 58b ?ZV*qw&tl-A`4.ui5vy",N,K/n9=*s()XjBBHcœ j7^\[LMӀ'"FTziSJs UHbZy' f4{+ݹF2N~ZeVg_4):[Άed].]:&Vf)z1XBIv\/H6Hd?l_DNY\F逍 ZӸ. ,$. fA#_l+=kXVs ^xZ>@ah~.%0{7jm>G64A=dw#1r@ tư=/Fõ)Ѓy!t&yjmL$ഩ|ǩ{ɘdxzlCZp6p0SW ~ŶP:_?A]1*uֻuw26BG LUp੢3yCP *0‰b\x?RAK\9?3J\|n5:;+q?T!<82ks@$μ|cZyu9-/H6 YZ