Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

selinux-policy-doc-37.12-2.fc37 RPM for noarch

From Fedora 37 for s390x / s

Name: selinux-policy-doc Distribution: Fedora Project
Version: 37.12 Vendor: Fedora Project
Release: 2.fc37 Build date: Fri Sep 23 17:34:44 2022
Group: Unspecified Build host: buildvm-x86-16.iad2.fedoraproject.org
Size: 32684139 Source RPM: selinux-policy-37.12-2.fc37.src.rpm
Packager: Fedora Project
Url: https://github.com/fedora-selinux/selinux-policy
Summary: SELinux policy documentation
SELinux policy documentation package.
This package contains manual pages and documentation of the policy modules.

Provides

Requires

License

GPLv2+

Changelog

* Fri Sep 23 2022 Zdenek Pytela <zpytela@redhat.com> - 37.12-2
  - Update make-rhat-patches.sh file to use the f37 dist-git branch in F37
* Thu Sep 22 2022 Zdenek Pytela <zpytela@redhat.com> - 37.12-1
  - nut-upsd: kernel_read_system_state, fs_getattr_cgroup
  - Add numad the ipc_owner capability
  - Allow gst-plugin-scanner read virtual memory sysctls
  - Allow init read/write inherited user fifo files
  - Update dnssec-trigger policy: setsched, module_request
  - added policy for systemd-socket-proxyd
  - Add the new 'cmd' permission to the 'io_uring' class
  - Allow winbind-rpcd read and write its key ring
  - Label /run/NetworkManager/no-stub-resolv.conf net_conf_t
  - blueman-mechanism can read ~/.local/lib/python*/site-packages directory
  - pidof executed by abrt can readlink /proc/*/exe
  - Fix typo in comment
  - Do not run restorecon /etc/NetworkManager/dispatcher.d in mls and minimum
* Wed Sep 14 2022 Zdenek Pytela <zpytela@redhat.com> - 37.11-1
  - Allow tor get filesystem attributes
  - Allow utempter append to login_userdomain stream
  - Allow login_userdomain accept a stream connection to XDM
  - Allow login_userdomain write to boltd named pipes
  - Allow staff_u and user_u users write to bolt pipe
  - Allow login_userdomain watch various directories
  - Update rhcd policy for executing additional commands 5
  - Update rhcd policy for executing additional commands 4
  - Allow rhcd create rpm hawkey logs with correct label
  - Allow systemd-gpt-auto-generator to check for empty dirs
  - Update rhcd policy for executing additional commands 3
  - Allow journalctl read rhcd fifo files
  - Update insights-client policy for additional commands execution 5
  - Allow init remount all file_type filesystems
  - Confine insights-client systemd unit
  - Update insights-client policy for additional commands execution 4
  - Allow pcp pmcd search tracefs and acct_data dirs
  - Allow httpd read network sysctls
  - Dontaudit domain map permission on directories
  - Revert "Allow X userdomains to mmap user_fonts_cache_t dirs"
  - Revert "Allow xdm_t domain to mmap /var/lib/gdm/.cache/fontconfig BZ(1725509)"
  - Update insights-client policy for additional commands execution 3
  - Allow systemd permissions needed for sandboxed services
  - Add rhcd module
  - Make dependency on rpm-plugin-selinux unordered
* Fri Sep 02 2022 Zdenek Pytela <zpytela@redhat.com> - 37.10-1
  - Allow ipsec_t read/write tpm devices
  - Allow rhcd execute all executables
  - Update rhcd policy for executing additional commands 2
  - Update insights-client policy for additional commands execution 2
  - Allow sysadm_t read raw memory devices
  - Allow chronyd send and receive chronyd/ntp client packets
  - Allow ssh client read kerberos homedir config files
  - Label /var/log/rhc-worker-playbook with rhcd_var_log_t
  - Update insights-client policy (auditctl, gpg, journal)
  - Allow system_cronjob_t domtrans to rpm_script_t
  - Allow smbd_t process noatsecure permission for winbind_rpcd_t
  - Update tor_bind_all_unreserved_ports interface
  - Allow chronyd bind UDP sockets to ptp_event ports.
  - Allow unconfined and sysadm users transition for /root/.gnupg
  - Add gpg_filetrans_admin_home_content() interface
  - Update rhcd policy for executing additional commands
  - Update insights-client policy for additional commands execution
  - Add userdom_view_all_users_keys() interface
  - Allow gpg read and write generic pty type
  - Allow chronyc read and write generic pty type
  - Allow system_dbusd ioctl kernel with a unix stream sockets
  - Allow samba-bgqd to read a printer list
  - Allow stalld get and set scheduling policy of all domains.
  - Allow unconfined_t transition to targetclid_home_t
* Thu Aug 11 2022 Zdenek Pytela <zpytela@redhat.com> - 37.9-1
  - Allow nm-dispatcher custom plugin dbus chat with nm
  - Allow nm-dispatcher sendmail plugin get status of systemd services
  - Allow xdm read the kernel key ring
  - Allow login_userdomain check status of mount units
  - Allow postfix/smtp and postfix/virtual read kerberos key table
  - Allow services execute systemd-notify
  - Do not allow login_userdomain use sd_notify()
  - Allow launch-xenstored read filesystem sysctls
  - Allow systemd-modules-load write to /dev/kmsg and send a message to syslogd
  - Allow openvswitch fsetid capability
  - Allow openvswitch use its private tmpfs files and dirs
  - Allow openvswitch search tracefs dirs
  - Allow pmdalinux read files on an nfsd filesystem
  - Allow winbind-rpcd write to winbind pid files
  - Allow networkmanager to signal unconfined process
  - Allow systemd_hostnamed label /run/systemd/* as hostnamed_etc_t
  - Allow samba-bgqd get a printer list
  - fix(init.fc): Fix section description
  - Allow fedora-third-party read the passwords file
  - Remove permissive domain for rhcd_t
  - Allow pmie read network state information and network sysctls
  - Revert "Dontaudit domain the fowner capability"
  - Allow sysadm_t to run bpftool on the userdomain attribute
  - Add the userdom_prog_run_bpf_userdomain() interface
  - Allow insights-client rpm named file transitions
  - Add /var/tmp/insights-archive to insights_client_filetrans_named_content
* Mon Aug 01 2022 Zdenek Pytela <zpytela@redhat.com> - 37.8-1
  - Allow sa-update to get init status and start systemd files
  - Use insights_client_filetrans_named_content
  - Make default file context match with named transitions
  - Allow nm-dispatcher tlp plugin send system log messages
  - Allow nm-dispatcher tlp plugin create and use unix_dgram_socket
  - Add permissions to manage lnk_files into gnome_manage_home_config
  - Allow rhsmcertd to read insights config files
  - Label /etc/insights-client/machine-id
  - fix(devices.fc): Replace single quote in comment to solve parsing issues
  - Make NetworkManager_dispatcher_custom_t an unconfined domain
* Sat Jul 23 2022 Fedora Release Engineering <releng@fedoraproject.org> - 37.7-2
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Thu Jul 14 2022 Zdenek Pytela <zpytela@redhat.com> - 37.7-1
  - Update winbind_rpcd_t
  - Allow some domains use sd_notify()
  - Revert "Allow rabbitmq to use systemd notify"
  - fix(sedoctool.py): Fix syntax warning: "is not" with a literal
  - Allow nm-dispatcher console plugin manage etc files
  - Allow networkmanager_dispatcher_plugin list NetworkManager_etc_t dirs
  - Allow nm-dispatcher console plugin setfscreate
  - Support using systemd-update-helper in rpm scriptlets
  - Allow nm-dispatcher winbind plugin read samba config files
  - Allow domain use userfaultfd over all domains
  - Allow cups-lpd read network sysctls
* Wed Jun 29 2022 Zdenek Pytela <zpytela@redhat.com> - 37.6-1
  - Allow stalld set scheduling policy of kernel threads
  - Allow targetclid read /var/target files
  - Allow targetclid read generic SSL certificates (fixed)
  - Allow firewalld read the contents of the sysfs filesystem
  - Fix file context pattern for /var/target
  - Use insights_client_etc_t in insights_search_config()
  - Allow nm-dispatcher ddclient plugin handle systemd services
  - Allow nm-dispatcher winbind plugin run smbcontrol
  - Allow nm-dispatcher custom plugin create and use unix dgram socket
  - Update samba-dcerpcd policy for kerberos usage 2
  - Allow keepalived read the contents of the sysfs filesystem
  - Allow amandad read network sysctls
  - Allow cups-lpd read network sysctls
  - Allow kpropd read network sysctls
  - Update insights_client_filetrans_named_content()
  - Allow rabbitmq to use systemd notify
  - Label /var/target with targetd_var_t
  - Allow targetclid read generic SSL certificates
  - Update rhcd policy
  - Allow rhcd search insights configuration directories
  - Add the kernel_read_proc_files() interface
  - Require policycoreutils >= 3.4-1
  - Add a script for enclosing interfaces in ifndef statements
  - Disable rpm verification on interface_info
* Wed Jun 22 2022 Zdenek Pytela <zpytela@redhat.com> - 37.5-1
  - Allow transition to insights_client named content
  - Add the insights_client_filetrans_named_content() interface
  - Update policy for insights-client to run additional commands 3
  - Allow dhclient manage pid files used by chronyd
  - Allow stalld get scheduling policy of kernel threads
  - Allow samba-dcerpcd work with sssd
  - Allow dlm_controld send a null signal to a cluster daemon
  - Allow ksmctl create hardware state information files
  - Allow winbind_rpcd_t connect to self over a unix_stream_socket
  - Update samba-dcerpcd policy for kerberos usage
  - Allow insights-client execute its private memfd: objects
  - Update policy for insights-client to run additional commands 2
  - Use insights_client_tmp_t instead of insights_client_var_tmp_t
  - Change space indentation to tab in insights-client
  - Use socket permissions sets in insights-client
  - Update policy for insights-client to run additional commands
  - Change rpm_setattr_db_files() to use a pattern
  - Allow init_t to rw insights_client unnamed pipe
  - Add rpm setattr db files macro
  - Fix insights client
  - Update kernel_read_unix_sysctls() for sysctl_net_unix_t handling
  - Allow rabbitmq to access its private memfd: objects
  - Update policy for samba-dcerpcd
  - Allow stalld setsched and sys_nice
* Tue Jun 07 2022 Zdenek Pytela <zpytela@redhat.com> - 37.4-1
  - Allow auditd_t noatsecure for a transition to audisp_remote_t
  - Allow ctdbd nlmsg_read on netlink_tcpdiag_socket
  - Allow pcp_domain execute its private memfd: objects
  - Add support for samba-dcerpcd
  - Add policy for wireguard
  - Confine targetcli
  - Allow systemd work with install_t unix stream sockets
  - Allow iscsid the sys_ptrace userns capability
  - Allow xdm connect to unconfined_service_t over a unix stream socket
* Fri May 27 2022 Zdenek Pytela <zpytela@redhat.com> - 37.3-1
  - Allow nm-dispatcher custom plugin execute systemctl
  - Allow nm-dispatcher custom plugin dbus chat with nm
  - Allow nm-dispatcher custom plugin create and use udp socket
  - Allow nm-dispatcher custom plugin create and use netlink_route_socket
  - Use create_netlink_socket_perms in netlink_route_socket class permissions
  - Add support for nm-dispatcher sendmail scripts
  - Allow sslh net_admin capability
  - Allow insights-client manage gpg admin home content
  - Add the gpg_manage_admin_home_content() interface
  - Allow rhsmcertd create generic log files
  - Update logging_create_generic_logs() to use create_files_pattern()
  - Label /var/cache/insights with insights_client_cache_t
  - Allow insights-client search gconf homedir
  - Allow insights-client create and use unix_dgram_socket
  - Allow blueman execute its private memfd: files
  - Move the chown call into make-srpm.sh
* Fri May 06 2022 Zdenek Pytela <zpytela@redhat.com> - 37.2-1
  - Use the networkmanager_dispatcher_plugin attribute in allow rules
  - Make a custom nm-dispatcher plugin transition
  - Label port 4784/tcp and 4784/udp with bfd_multi
  - Allow systemd watch and watch_reads user ptys
  - Allow sblim-gatherd the kill capability
  - Label more vdsm utils with virtd_exec_t
  - Add ksm service to ksmtuned
  - Add rhcd policy
  - Dontaudit guest attempts to dbus chat with systemd domains
  - Dontaudit guest attempts to dbus chat with system bus types
  - Use a named transition in systemd_hwdb_manage_config()
  - Add default fc specifications for patterns in /opt
  - Add the files_create_etc_files() interface
  - Allow nm-dispatcher console plugin create and write files in /etc
  - Allow nm-dispatcher console plugin transition to the setfiles domain
  - Allow more nm-dispatcher plugins append to init stream sockets
  - Allow nm-dispatcher tlp plugin dbus chat with nm
  - Reorder networkmanager_dispatcher_plugin_template() calls
  - Allow svirt connectto virtlogd
  - Allow blueman map its private memfd: files
  - Allow sysadm user execute init scripts with a transition
  - Allow sblim-sfcbd connect to sblim-reposd stream
  - Allow keepalived_unconfined_script_t dbus chat with init
  - Run restorecon with "-i" not to report errors
* Mon May 02 2022 Zdenek Pytela <zpytela@redhat.com> - 37.1-1
  - Fix users for SELinux userspace 3.4
  - Label /var/run/machine-id as machineid_t
  - Add stalld to modules.conf
  - Use files_tmpfs_file() for rhsmcertd_tmpfs_t
  - Allow blueman read/write its private memfd: objects
  - Allow insights-client read rhnsd config files
  - Allow insights-client create_socket_perms for tcp/udp sockets
* Tue Apr 26 2022 Zdenek Pytela <zpytela@redhat.com> - 36.8-1
  - Allow nm-dispatcher chronyc plugin append to init stream sockets
  - Allow tmpreaper the sys_ptrace userns capability
  - Label /usr/libexec/vdsm/supervdsmd and vdsmd with virtd_exec_t
  - Allow nm-dispatcher tlp plugin read/write the wireless device
  - Allow nm-dispatcher tlp plugin append to init socket
  - Allow nm-dispatcher tlp plugin be client of a system bus
  - Allow nm-dispatcher list its configuration directory
  - Ecryptfs-private support
  - Allow colord map /var/lib directories
  - Allow ntlm_auth read the network state information
  - Allow insights-client search rhnsd configuration directory
* Thu Apr 21 2022 Zdenek Pytela <zpytela@redhat.com> - 36.7-3
  - Add support for nm-dispatcher tlp-rdw scripts
  - Update github actions to satisfy git 2.36 stricter rules
  - New policy for stalld
  - Allow colord read generic files in /var/lib
  - Allow xdm mounton user temporary socket files
  - Allow systemd-gpt-auto-generator create and use netlink_kobject_uevent_socket
  - Allow sssd domtrans to pkcs_slotd_t
  - Allow keepalived setsched and sys_nice
  - Allow xdm map generic files in /var/lib
  - Allow xdm read generic symbolic links in /var/lib
  - Allow pppd create a file in the locks directory
  - Add file map permission to lpd_manage_spool() interface
  - Allow system dbus daemon watch generic directories in /var/lib
  - Allow pcscd the sys_ptrace userns capability
  - Add the corecmd_watch_bin_dirs() interface
* Thu Apr 21 2022 Zdenek Pytela <zpytela@redhat.com> - 36.7-2
  - Relabel explicitly some dirs in %posttrans scriptlets
* Thu Apr 21 2022 Zdenek Pytela <zpytela@redhat.com> - 36.7-1
  - Add stalld module to modules-targeted-contrib.conf
* Mon Apr 04 2022 Zdenek Pytela <zpytela@redhat.com> - 36.6-1
  - Add support for systemd-network-generator
  - Add the io_uring class
  - Allow nm-dispatcher dhclient plugin append to init stream sockets
  - Relax the naming pattern for systemd private shared libraries
  - Allow nm-dispatcher iscsid plugin append to init socket
  - Add the init_append_stream_sockets() interface
  - Allow nm-dispatcher dnssec-trigger script to execute pidof
  - Add support for nm-dispatcher dnssec-trigger scripts
  - Allow chronyd talk with unconfined user over unix domain dgram socket
  - Allow fenced read kerberos key tables
  - Add support for nm-dispatcher ddclient scripts
  - Add systemd_getattr_generic_unit_files() interface
  - Allow fprintd read and write hardware state information
  - Allow exim watch generic certificate directories
  - Remove duplicate fc entries for corosync and corosync-notifyd
  - Label corosync-cfgtool with cluster_exec_t
  - Allow qemu-kvm create and use netlink rdma sockets
  - Allow logrotate a domain transition to cluster administrative domain
* Fri Mar 18 2022 Zdenek Pytela <zpytela@redhat.com> - 36.5-1
  - Add support for nm-dispatcher console helper scripts
  - Allow nm-dispatcher plugins read its directory and sysfs
  - Do not let system_cronjob_t create redhat-access-insights.log with var_log_t
  - devices: Add a comment about cardmgr_dev_t
  - Add basic policy for BinderFS
  - Label /var/run/ecblp0 pipe with cupsd_var_run_t
  - Allow rpmdb create directory in /usr/lib/sysimage
  - Allow rngd drop privileges via setuid/setgid/setcap
  - Allow init watch and watch_reads user ttys
  - Allow systemd-logind dbus chat with sosreport
  - Allow chronyd send a message to sosreport over datagram socket
  - Remove unnecessary /etc file transitions for insights-client
  - Label all content in /var/lib/insights with insights_client_var_lib_t
  - Update insights-client policy
* Wed Feb 23 2022 Zdenek Pytela <zpytela@redhat.com> - 36.4-2
  - Add insights_client module to modules-targeted-contrib.conf
* Wed Feb 23 2022 Zdenek Pytela <zpytela@redhat.com> - 36.4-1
  - Update NetworkManager-dispatcher cloud and chronyc policy
  - Update insights-client: fc pattern, motd, writing to etc
  - Allow systemd-sysctl read the security state information
  - Allow init create and mounton to support PrivateDevices
  - Allow sosreport dbus chat abrt systemd timedatex
* Tue Feb 22 2022 Zdenek Pytela <zpytela@redhat.com> - 36.3-2
  - Update specfile to buildrequire policycoreutils-devel >= 3.3-4
  - Add modules_checksum to %files
* Thu Feb 17 2022 Zdenek Pytela <zpytela@redhat.com> - 36.3-1
  - Update NetworkManager-dispatcher policy to use scripts
  - Allow init mounton kernel messages device
  - Revert "Make dbus-broker service working on s390x arch"
  - Remove permissive domain for insights_client_t
  - Allow userdomain read symlinks in /var/lib
  - Allow iptables list cgroup directories
  - Dontaudit mdadm list dirsrv tmpfs dirs
  - Dontaudit dirsrv search filesystem sysctl directories
  - Allow chage domtrans to sssd
  - Allow postfix_domain read dovecot certificates
  - Allow systemd-networkd create and use netlink netfilter socket
  - Allow nm-dispatcher read nm-dispatcher-script symlinks
  - filesystem.te: add genfscon rule for ntfs3 filesystem
  - Allow rhsmcertd get attributes of cgroup filesystems
  - Allow sandbox_web_client_t watch various dirs
  - Exclude container.if from policy devel files
  - Run restorecon on /usr/lib/sysimage/rpm instead of /var/lib/rpm
* Fri Feb 11 2022 Zdenek Pytela <zpytela@redhat.com> - 36.2-1
  - Allow sysadm_passwd_t to relabel passwd and group files
  - Allow confined sysadmin to use tool vipw
  - Allow login_userdomain map /var/lib/directories
  - Allow login_userdomain watch library and fonts dirs
  - Allow login_userdomain watch system configuration dirs
  - Allow login_userdomain read systemd runtime files
  - Allow ctdb create cluster logs
  - Allow alsa bind mixer controls to led triggers
  - New policy for insight-client
  - Add mctp_socket security class and access vectors
  - Fix koji repo URL pattern
  - Update chronyd_pid_filetrans() to allow create dirs
  - Update NetworkManager-dispatcher policy
  - Allow unconfined to run virtd bpf
  - Allow nm-privhelper setsched permission and send system logs
  - Add the map permission to common_anon_inode_perm permission set
  - Rename userfaultfd_anon_inode_perms to common_inode_perms
  - Allow confined users to use kinit,klist and etc.
  - Allow rhsmcertd create rpm hawkey logs with correct label
* Thu Feb 03 2022 Zdenek Pytela <zpytela@redhat.com> - 36.1-1
  - Label exFAT utilities at /usr/sbin
  - policy/modules/contrib: Support /usr/lib/sysimage/rpm as the rpmdb path
  - Enable genfs_seclabel_symlinks policy capability
  - Sync policy/policy_capabilities with refpolicy
  - refpolicy: drop unused socket security classes
  - Label new utility of NetworkManager nm-priv-helper
  - Label NetworkManager-dispatcher service with separate context
  - Allow sanlock get attributes of filesystems with extended attributes
  - Associate stratisd_data_t with device filesystem
  - Allow init read stratis data symlinks
* Tue Feb 01 2022 Zdenek Pytela <zpytela@redhat.com> - 35.13-1
  - Allow systemd services watch dbusd pid directory and its parents
  - Allow ModemManager connect to the unconfined user domain
  - Label /dev/wwan.+ with modem_manager_t
  - Allow alsactl set group Process ID of a process
  - Allow domtrans to sssd_t and role access to sssd
  - Creating interface sssd_run_sssd()
  - Label utilities for exFAT filesystems with fsadm_exec_t
  - Label /dev/nvme-fabrics with fixed_disk_device_t
  - Allow init delete generic tmp named pipes
  - Allow timedatex dbus chat with xdm
* Wed Jan 26 2022 Zdenek Pytela <zpytela@redhat.com> - 35.12-1
  - Fix badly indented used interfaces
  - Allow domain transition to sssd_t
  - Dontaudit sfcbd sys_ptrace cap_userns
  - Label /var/lib/plocate with locate_var_lib_t
  - Allow hostapd talk with unconfined user over unix domain dgram socket
  - Allow NetworkManager talk with unconfined user over unix domain dgram socket
  - Allow system_mail_t read inherited apache system content rw files
  - Add apache_read_inherited_sys_content_rw_files() interface
  - Allow rhsm-service execute its private memfd: objects
  - Allow dirsrv read configfs files and directories
  - Label /run/stratisd with stratisd_var_run_t
  - Allow tumblerd write to session_dbusd tmp socket files
* Wed Jan 19 2022 Zdenek Pytela <zpytela@redhat.com> - 35.11-1
  - Revert "Label /etc/cockpit/ws-certs.d with cert_t"
  - Allow login_userdomain write to session_dbusd tmp socket files
  - Label /var/run/user/%{USERID}/dbus with session_dbusd_tmp_t
* Mon Jan 17 2022 Zdenek Pytela <zpytela@redhat.com> - 35.10-1
  - Allow login_userdomain watch systemd-machined PID directories
  - Allow login_userdomain watch systemd-logind PID directories
  - Allow login_userdomain watch accountsd lib directories
  - Allow login_userdomain watch localization directories
  - Allow login_userdomain watch various files and dirs
  - Allow login_userdomain watch generic directories in /tmp
  - Allow rhsm-service read/write its private memfd: objects
  - Allow radiusd connect to the radacct port
  - Allow systemd-io-bridge ioctl rpm_script_t
  - Allow systemd-coredump userns capabilities and root mounton
  - Allow systemd-coredump read and write usermodehelper state
  - Allow login_userdomain create session_dbusd tmp socket files
  - Allow gkeyringd_domain write to session_dbusd tmp socket files
  - Allow systemd-logind delete session_dbusd tmp socket files
  - Allow gdm-x-session write to session dbus tmp sock files
  - Label /etc/cockpit/ws-certs.d with cert_t
  - Allow kpropd get attributes of cgroup filesystems
  - Allow administrative users the bpf capability
  - Allow sysadm_t start and stop transient services
  - Connect triggerin to pcre2 instead of pcre
* Wed Jan 12 2022 Zdenek Pytela <zpytela@redhat.com> - 35.9-1
  - Allow sshd read filesystem sysctl files
  - Revert "Allow sshd read sysctl files"
  - Allow tlp read its systemd unit
  - Allow gssproxy access to various system files.
  - Allow gssproxy read, write, and map ica tmpfs files
  - Allow gssproxy read and write z90crypt device
  - Allow sssd_kcm read and write z90crypt device
  - Allow smbcontrol read the network state information
  - Allow virt_domain map vhost devices
  - Allow fcoemon request the kernel to load a module
  - Allow sshd read sysctl files
  - Ensure that `/run/systemd/*` are properly labeled
  - Allow admin userdomains use socketpair()
  - Change /run/user/[0-9]+ to /run/user/%{USERID} for proper labeling
  - Allow lldpd connect to snmpd with a unix domain stream socket
  - Dontaudit pkcsslotd sys_admin capability
* Thu Dec 23 2021 Zdenek Pytela <zpytela@redhat.com> - 35.8-1
  - Allow haproxy get attributes of filesystems with extended attributes
  - Allow haproxy get attributes of cgroup filesystems
  - Allow sysadm execute sysadmctl in sysadm_t domain using sudo
  - Allow userdomains use pam_ssh_agent_auth for passwordless sudo
  - Allow sudodomains execute passwd in the passwd domain
  - Allow braille printing in selinux
  - Allow sandbox_xserver_t map sandbox_file_t
  - Label /dev/ngXnY and /dev/nvme-subsysX with fixed_disk_device_t
  - Add hwtracing_device_t type for hardware-level tracing and debugging
  - Label port 9528/tcp with openqa_liveview
  - Label /var/lib/shorewall6-lite with shorewall_var_lib_t
  - Document Security Flask model in the policy
* Fri Dec 10 2021 Zdenek Pytela <zpytela@redhat.com> - 35.7-1
  - Allow systemd read unlabeled symbolic links
  - Label abrt-action-generate-backtrace with abrt_handle_event_exec_t
  - Allow dnsmasq watch /etc/dnsmasq.d directories
  - Allow rhsmcertd get attributes of tmpfs_t filesystems
  - Allow lldpd use an snmp subagent over a tcp socket
  - Allow xdm watch generic directories in /var/lib
  - Allow login_userdomain open/read/map system journal
  - Allow sysadm_t connect to cluster domains over a unix stream socket
  - Allow sysadm_t read/write pkcs shared memory segments
  - Allow sysadm_t connect to sanlock over a unix stream socket
  - Allow sysadm_t dbus chat with sssd
  - Allow sysadm_t set attributes on character device nodes
  - Allow sysadm_t read and write watchdog devices
  - Allow smbcontrol use additional socket types
  - Allow cloud-init dbus chat with systemd-logind
  - Allow svnserve send mail from the system
  - Update userdom_exec_user_tmp_files() with an entrypoint rule
  - Allow sudodomain send a null signal to sshd processes
* Fri Nov 19 2021 Zdenek Pytela <zpytela@redhat.com> - 35.6-1
  - Allow PID 1 and dbus-broker IPC with a systemd user session
  - Allow rpmdb read generic SSL certificates
  - Allow rpmdb read admin home config files
  - Report warning on duplicate definition of interface
  - Allow redis get attributes of filesystems with extended attributes
  - Allow sysadm_t dbus chat with realmd_t
  - Make cupsd_lpd_t a daemon
  - Allow tlp dbus-chat with NetworkManager
  - filesystem: add fs_use_trans for ramfs
  - Allow systemd-logind destroy unconfined user's IPC objects
* Thu Nov 04 2021 Zdenek Pytela <zpytela@redhat.com> - 35.5-1
  - Support sanlock VG automated recovery on storage access loss 2/2
  - Support sanlock VG automated recovery on storage access loss 1/2
  - Revert "Support sanlock VG automated recovery on storage access loss"
  - Allow tlp get service units status
  - Allow fedora-third-party manage 3rd party repos
  - Allow xdm_t nnp_transition to login_userdomain
  - Add the auth_read_passwd_file() interface
  - Allow redis-sentinel execute a notification script
  - Allow fetchmail search cgroup directories
  - Allow lvm_t to read/write devicekit disk semaphores
  - Allow devicekit_disk_t to use /dev/mapper/control
  - Allow devicekit_disk_t to get IPC info from the kernel
  - Allow devicekit_disk_t to read systemd-logind pid files
  - Allow devicekit_disk_t to mount filesystems on mnt_t directories
  - Allow devicekit_disk_t to manage mount_var_run_t files
  - Allow rasdaemon sys_admin capability to verify the CAP_SYS_ADMIN of the soft_offline_page function implemented in the kernel
  - Use $releasever in koji repo to reduce rawhide hardcoding
  - authlogin: add fcontext for tcb
  - Add erofs as a SELinux capable file system
  - Allow systemd execute user bin files
  - Support sanlock VG automated recovery on storage access loss
  - Support new PING_CHECK health checker in keepalived
* Wed Oct 20 2021 Zdenek Pytela <zpytela@redhat.com> - 35.4-1
  - Allow fedora-third-party map generic cache files
  - Add gnome_map_generic_cache_files() interface
  - Add files_manage_var_lib_dirs() interface
  - Allow fedora-third party manage gpg keys
  - Allow fedora-third-party run "flatpak remote-add --from flathub"
* Tue Oct 19 2021 Zdenek Pytela <zpytela@redhat.com> - 35.3-1
  - Allow fedora-third-party run flatpak post-install actions
  - Allow fedora-third-party set_setsched and sys_nice
* Mon Oct 18 2021 Zdenek Pytela <zpytela@redhat.com> - 35.2-1
  - Allow fedora-third-party execute "flatpak remote-add"
  - Add files_manage_var_lib_files() interface
  - Add write permisson to userfaultfd_anon_inode_perms
  - Allow proper function sosreport via iotop
  - Allow proper function sosreport in sysadmin role
  - Allow fedora-third-party to connect to the system log service
  - Allow fedora-third-party dbus chat with policykit
  - Allow chrony-wait service start with DynamicUser=yes
  - Allow management of lnk_files if similar access to regular files
  - Allow unconfined_t transition to mozilla_plugin_t with NoNewPrivileges
  - Allow systemd-resolved watch /run/systemd
  - Allow fedora-third-party create and use unix_dgram_socket
  - Removing pkcs_tmpfs_filetrans interface and edit pkcs policy files
  - Allow login_userdomain named filetrans to pkcs_slotd_tmpfs_t domain
* Thu Oct 07 2021 Zdenek Pytela <zpytela@redhat.com> - 35.1-1
  - Add fedoratp module
  - Allow xdm_t domain transition to fedoratp_t
  - Allow ModemManager create and use netlink route socket
  - Add default file context for /run/gssproxy.default.sock
  - Allow xdm_t watch fonts directories
  - Allow xdm_t watch generic directories in /lib
  - Allow xdm_t watch generic pid directories
* Thu Sep 23 2021 Zdenek Pytela <zpytela@redhat.com> - 34.21-1
  - Add bluetooth-related permissions into a tunable block
  - Allow gnome at-spi processes create and use stream sockets
  - Allow usbmuxd get attributes of tmpfs_t filesystems
  - Allow fprintd install a sleep delay inhibitor
  - Allow collectd get attributes of infiniband devices
  - Allow collectd create and user netlink rdma socket
  - Allow collectd map packet_socket
  - Allow snort create and use blootooth socket
  - Allow systemd watch and watch_reads console devices
  - Allow snort create and use generic netlink socket
  - Allow NetworkManager dbus chat with fwupd
  - Allow unconfined domains read/write domain perf_events
  - Allow scripts to enter LUKS password
  - Update mount_manage_pid_files() to use manage_files_pattern
  - Support hitless reloads feature in haproxy
  - Allow haproxy list the sysfs directories content
  - Allow gnome at-spi processes get attributes of tmpfs filesystems
  - Allow unbound connectto unix_stream_socket
  - Allow rhsmcertd_t dbus chat with anaconda install_t
* Thu Sep 16 2021 Zdenek Pytela <zpytela@redhat.com> - 34.20-1
  - cleanup unused codes
  - Fix typo in the gnome_exec_atspi() interface summary
  - Allow xdm execute gnome-atspi services
  - Allow gnome at-spi processes execute dbus-daemon in caller domain
  - Allow xdm watch dbus configuration
  - Allow xdm execute dbus-daemon in the caller domain
  - Revert "Allow xdm_t transition to system_dbusd_t"
  - Allow at-spi-bus-launcher read and map xdm pid files
  - Allow dhcpcd set its resource limits
  - Allow systemd-sleep get removable devices attributes
  - Allow usbmuxd get attributes of fs_t filesystems
* Thu Sep 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.19-1
  - Update the dhcp client local policy
  - Allow firewalld load kernel modules
  - Allow postfix_domain to sendto unix dgram sockets.
  - Allow systemd watch unallocated ttys
* Tue Sep 07 2021 Zdenek Pytela <zpytela@redhat.com> - 34.18-1
  - Allow ModemManager create a qipcrtr socket
  - Allow ModemManager request to load a kernel module
  - Label /usr/sbin/virtproxyd as virtd_exec_t
  - Allow communication between at-spi and gdm processes
  - Update ica_filetrans_named_content() with create_file_perms
  - Fix the gnome_atspi_domtrans() interface summary
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-5
  - Add ica module to modules-targeted-contrib.conf
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-4
  - Add trailing \ to the relabel() block which is needed even in a comment
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-3
  - Add ica module to modules-targeted.conf
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-2
  - Relabel /var/lib/rpm explicitly
  - Revert "Relabel /dev/dma_heap explicitly"
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-1
  - Add support for at-spi
  - Add permissions for system dbus processes
  - Allow various domains work with ICA crypto accelerator
  - Add ica module
  - Revert "Support using ICA crypto accelerator on s390x arch"
  - Allow systemd to delete fwupd var cache files
  - Allow vmtools_unconfined_t domain transition to rpm_script_t
  - Allow dirsrv read slapd tmpfs files
  - Revert "Label /dev/shm/dirsrv/ with dirsrv_tmpfs_t label"
  - Rename samba_exec() to samba_exec_net()
  - Support using ICA crypto accelerator on s390x arch
  - Allow systemd delete /run/systemd/default-hostname
  - Allow tcpdump read system state information in /proc
  - Allow rhsmcertd to create cache file in /var/cache/cloud-what
  - Allow D-bus communication between avahi and sosreport
  - Label /usr/libexec/gdm-runtime-config with xdm_exec_t
  - Allow lldpad send to kdumpctl over a unix dgram socket
  - Revert "Allow lldpad send to kdump over a unix dgram socket"
  - Allow chronyc respond to a user chronyd instance
  - Allow ptp4l respond to pmc
  - Allow lldpad send to unconfined_t over a unix dgram socket
  - Allow sssd to set samba setting
* Thu Aug 12 2021 Zdenek Pytela <zpytela@redhat.com> - 34.16-1
  - Allow systemd-timesyncd watch system dbus pid socket files
  - Allow firewalld drop capabilities
  - Allow rhsmcertd execute gpg
  - Allow lldpad send to kdump over a unix dgram socket
  - Allow systemd-gpt-auto-generator read udev pid files
  - Set default file context for /sys/firmware/efi/efivars
  - Allow tcpdump run as a systemd service
  - Allow nmap create and use netlink generic socket
  - Allow nscd watch system db files in /var/db
  - Allow cockpit_ws_t get attributes of fs_t filesystems
  - Allow sysadm acces to kernel module resources
  - Allow sysadm to read/write scsi files and manage shadow
  - Allow sysadm access to files_unconfined and bind rpc ports
  - Allow sysadm read and view kernel keyrings
  - Allow journal mmap and read var lib files
  - Allow tuned to read rhsmcertd config files
  - Allow bootloader to read tuned etc files
  - Label /usr/bin/qemu-storage-daemon with virtd_exec_t
* Fri Aug 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.15-1
  - Disable seccomp on CI containers
  - Allow systemd-machined stop generic service units
  - Allow virtlogd_t read process state of user domains
  - Add "/" at the beginning of dev/shm/var\.lib\.opencryptoki.* regexp
  - Label /dev/crypto/nx-gzip with accelerator_device_t
  - Update the policy for systemd-journal-upload
  - Allow unconfined domains to bpf all other domains
  - Confine rhsm service and rhsm-facts service as rhsmcertd_t
  - Allow fcoemon talk with unconfined user over unix domain datagram socket
  - Allow abrt_domain read and write z90crypt device
  - Allow mdadm read iscsi pid files
  - Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern()
  - Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t
  - Allow hostapd bind UDP sockets to the dhcpd port
  - Unconfined domains should not be confined
* Fri Jul 23 2021 Fedora Release Engineering <releng@fedoraproject.org> - 34.14-2
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Wed Jul 14 2021 Zdenek Pytela <zpytela@redhat.com> - 34.14-1
  - Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory"
  - Remove references to init_watch_path_type attribute
  - Remove all redundant watch permissions for systemd
  - Allow systemd watch non_security_file_type dirs, files, lnk_files
  - Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
  - Allow bacula get attributes of cgroup filesystems
  - Allow systemd-journal-upload watch logs and journal
  - Create a policy for systemd-journal-upload
  - Allow tcpdump and nmap get attributes of infiniband_device_t
  - Allow arpwatch get attributes of infiniband_device_t devices
  - Label /dev/wmi/dell-smbios as acpi_device_t
* Thu Jul 01 2021 Zdenek Pytela <zpytela@redhat.com> - 34.13-1
  - Allow radius map its library files
  - Allow nftables read NetworkManager unnamed pipes
  - Allow logrotate rotate container log files
* Tue Jun 22 2021 Zdenek Pytela <zpytela@redhat.com> - 34.12-2
  - Add a systemd service to check that SELinux is disabled properly
  - specfile: Add unowned dir to the macro
  - Relabel /dev/dma_heap explicitly
* Mon Jun 21 2021 Zdenek Pytela <zpytela@redhat.com> - 34.12-1
  - Label /dev/dma_heap/* char devices with dma_device_t
  - Revert "Label /dev/dma_heap/* char devices with dma_device_t"
  - Revert "Label /dev/dma_heap with dma_device_dir_t"
  - Revert "Associate dma_device_dir_t with device filesystem"
  - Add the lockdown integrity permission to dev_map_userio_dev()
  - Allow systemd-modules-load read/write tracefs files
  - Allow sssd watch /run/systemd
  - Label /usr/bin/arping plain file with netutils_exec_t
  - Label /run/fsck with fsadm_var_run_t
  - Label /usr/bin/Xwayland with xserver_exec_t
  - Allow systemd-timesyncd watch dbus runtime dir
  - Allow asterisk watch localization files
  - Allow iscsid read all process stat
  - iptables.fc: Add missing legacy-restore and legacy-save entries
  - Label /run/libvirt/common with virt_common_var_run_t
  - Label /.k5identity file allow read of this file to rpc.gssd
  - Make usbmuxd_t a daemon
* Wed Jun 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.11-1
  - Allow sanlock get attributes of cgroup filesystems
  - Associate dma_device_dir_t with device filesystem
  - Set default file context for /var/run/systemd instead of /run/systemd
  - Allow nmap create and use rdma socket
  - Allow pkcs-slotd create and use netlink_kobject_uevent_socket
* Sun Jun 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.10-1
  - Allow using opencryptoki for ipsec
  - Allow using opencryptoki for certmonger
  - Label var.lib.opencryptoki.* files and create pkcs_tmpfs_filetrans()
  - Label /dev/dma_heap with dma_device_dir_t
  - Allow syslogd watch non security dirs conditionally
  - Introduce logging_syslogd_list_non_security_dirs tunable
  - Remove openhpi module
  - Allow udev to watch fixed disk devices
  - Allow httpd_sys_script_t read, write, and map hugetlbfs files
  - Allow apcupsd get attributes of cgroup filesystems
* Thu May 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.9-1
  - Add kerberos object filetrans for nsswitchdomain
  - Allow fail2ban watch various log files
  - Add logging_watch_audit_log_files() and logging_watch_audit_log_dirs()
  - Remove further modules recently removed from refpolicy
  - Remove modules not shipped and not present in refpolicy
  - Revert "Add permission open to files_read_inherited_tmp_files() interface"
  - Revert "Allow pcp_pmlogger_t to use setrlimit BZ(1708951)"
  - Revert "Dontaudit logrotate to setrlimit itself. rhbz#1309604"
  - Revert "Allow cockpit_ws_t domain to set limits BZ(1701703)"
  - Dontaudit setrlimit for domains that exec systemctl
  - Allow kdump_t net_admin capability
  - Allow nsswitch_domain read init pid lnk_files
  - Label /dev/trng with random_device_t
  - Label /run/systemd/default-hostname with hostname_etc_t
  - Add default file context specification for dnf log files
  - Label /dev/zram[0-9]+ block device files with fixed_disk_device_t
  - Label /dev/udmabuf character device with dma_device_t
  - Label /dev/dma_heap/* char devices with dma_device_t
  - Label /dev/acpi_thermal_rel char device with acpi_device_t
* Thu May 20 2021 Zdenek Pytela <zpytela@redhat.com> - 34.8-2
  - Remove temporary explicit /dev/nvme relabeling
* Thu May 20 2021 Zdenek Pytela <zpytela@redhat.com> - 34.8-1
  - Allow local_login_t nnp_transition to login_userdomain
  - Allow asterisk watch localization symlinks
  - Allow NetworkManager_t to watch /etc
  - Label /var/lib/kdump with kdump_var_lib_t
  - Allow amanda get attributes of cgroup filesystems
  - Allow sysadm_t nnp_domtrans to systemd_tmpfiles_t
  - Allow install_t nnp_domtrans to setfiles_mac_t
  - Allow fcoemon create sysfs files
* Thu May 13 2021 Zdenek Pytela <zpytela@redhat.com> - 34.7-1
  - Allow tgtd read and write infiniband devices
  - Add a comment on virt_sandbox booleans with empty content
  - Deprecate duplicate dev_write_generic_sock_files() interface
  - Allow vnstatd_t map vnstatd_var_lib_t files
  - Allow privoxy execmem
  - Allow pmdakvm read information from the debug filesystem
  - Add lockdown integrity into kernel_read_debugfs() and kernel_manage_debugfs()
  - Add permissions to delete lnk_files into gnome_delete_home_config()
  - Remove rules for inotifyfs
  - Remove rules for anon_inodefs
  - Allow systemd nnp_transition to login_userdomain
  - Allow unconfined_t write other processes perf_event records
  - Allow sysadm_t dbus chat with tuned
  - Allow tuned write profile files with file transition
  - Allow tuned manage perf_events
  - Make domains use kernel_write_perf_event() and kernel_manage_perf_event()
* Fri May 07 2021 Zdenek Pytela <zpytela@redhat.com> - 34.6-1
  - Make domains use kernel_write_perf_event() and kernel_manage_perf_event()
  - Add kernel_write_perf_event() and kernel_manage_perf_event()
  - Allow syslogd_t watch root and var directories
  - Allow unconfined_t read other processes perf_event records
  - Allow login_userdomain read and map /var/lib/systemd files
  - Allow NetworkManager watch its config dir
  - Allow NetworkManager read and write z90crypt device
  - Allow tgtd create and use rdma socket
  - Allow aide connect to init with a unix socket
* Tue May 04 2021 Zdenek Pytela <zpytela@redhat.com> - 34.5-1
  - Grant execmem to varnishlog_t
  - We no longer need signull for varnishlog_t
  - Add map permission to varnishd_read_lib_files
  - Allow systemd-sleep tlp_filetrans_named_content()
  - Allow systemd-sleep execute generic programs
  - Allow systemd-sleep execute shell
  - Allow to sendmail read/write kerberos host rcache files
  - Allow freshclam get attributes of cgroup filesystems
  - Fix context of /run/systemd/timesync
  - Allow udev create /run/gdm with proper type
  - Allow chronyc socket file transition in user temp directory
  - Allow virtlogd_t to create virt_var_lockd_t dir
  - Allow pluto IKEv2 / ESP over TCP
* Tue Apr 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.4-1
  - Allow domain create anonymous inodes
  - Add anon_inode class to the policy
  - Allow systemd-coredump getattr nsfs files and net_admin capability
  - Allow systemd-sleep transition to sysstat_t
  - Allow systemd -sleep transition to tlp_t
  - Allow systemd-sleep transition to unconfined_service_t on bin_t executables
  - Allow systemd-timedated watch runtime dir and its parent
  - Allow system dbusd read /var/lib symlinks
  - Allow unconfined_service_t confidentiality and integrity lockdown
  - Label /var/lib/brltty with brltty_var_lib_t
  - Allow domain and unconfined_domain_type watch /proc/PID dirs
  - Additional permission for confined users loging into graphic session
  - Make for screen fsetid/setuid/setgid permission conditional
  - Allow for confined users acces to wtmp and run utempter
* Fri Apr 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.3-1
  - Label /etc/redis as redis_conf_t
  - Add brltty new permissions required by new upstream version
  - Allow cups-lpd read its private runtime socket files
  - Dontaudit daemon open and read init_t file
  - Add file context specification for /var/tmp/tmp-inst
  - Allow brltty create and use bluetooth_socket
  - Allow usbmuxd get attributes of cgroup filesystems
* Tue Apr 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.2-1
  - Allow usbmuxd get attributes of cgroup filesystems
  - Allow accounts-daemon get attributes of cgroup filesystems
  - Allow pool-geoclue get attributes of cgroup filesystems
  - allow systemd-sleep to set timer for suspend-then-hibernate
  - Allow aide connect to systemd-userdbd with a unix socket
  - Add new interfaces with watch_mount and watch_with_perm permissions
  - Add file context specification for /usr/libexec/realmd
  - Allow /tmp file transition for dbus-daemon also for sock_file
  - Allow login_userdomain create cgroup files
  - Allow plymouthd_t exec generic program in bin directories
* Thu Apr 01 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1-1
  - Change the package versioning
* Thu Apr 01 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-10
  - Allow plymouthd_t exec generic program in bin directories
  - Allow dhcpc_t domain transition to chronyc_t
  - Allow login_userdomain bind xmsg port
  - Allow ibacm the net_raw and sys_rawio capabilities
  - Allow nsswitch_domain read cgroup files
  - Allow systemd-sleep create hardware state information files
* Mon Mar 29 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-9
  - Add watch_with_perm_dirs_pattern file pattern
* Fri Mar 26 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-8
  - Allow arpwatch_t create netlink generic socket
  - Allow postgrey read network state
  - Add watch_mount_dirs_pattern file pattern
  - Allow bluetooth_t dbus chat with fwupd_t
  - Allow xdm_t watch accountsd lib directories
  - Add additional interfaces for watching /boot
  - Allow sssd_t get attributes of tmpfs filesystems
  - Allow local_login_t get attributes of tmpfs filesystems
  - Dontaudit domain the fowner capability
  - Extend fs_manage_nfsd_fs() to allow managing dirs as well
  - Allow spice-vdagentd watch systemd-logind session dirs
* Fri Mar 19 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-7
  - Allow xdm_t watch systemd-logind session dirs
  - Allow xdm_t transition to system_dbusd_t
  - Allow confined users login into graphic session
  - Allow login_userdomain watch systemd login session dirs
  - install_t: Allow NoNewPriv transition from systemd
  - Remove setuid/setgid capabilities from mysqld_t
  - Add context for new mariadbd executable files
  - Allow netutils_t create netlink generic socket
  - Allow systemd the audit_control capability conditionally
* Thu Mar 11 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-6
  - Allow polkit-agent-helper-1 read logind sessions files
  - Allow polkit-agent-helper read init state
  - Allow login_userdomain watch generic device dirs
  - Allow login_userdomain listen on bluetooth sockets
  - Allow user_t and staff_t bind netlink_generic_socket
  - Allow login_userdomain write inaccessible nodes
  - Allow transition from xdm domain to unconfined_t domain.
  - Add 'make validate' step to CI
  - Disallow user_t run su/sudo and staff_t run su
  - Fix typo in rsyncd.conf in rsync.if
  - Add an alias for nvme_device_t
  - Allow systemd watch and watch_reads unallocated ttys
* Wed Mar 03 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-5
  - Allow apmd watch generic device directories
  - Allow kdump load a new kernel
  - Add confidentiality lockdown permission to kernel_read_core_if()
  - Allow keepalived read nsfs files
  - Allow local_login_t get attributes of filesystems with ext attributes
  - Allow keepalived read/write its private memfd: objects
  - Add missing declaration in rpm_named_filetrans()
  - Change param description in cron interfaces to userdomain_prefix
* Wed Feb 24 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-4
  - iptables.fc: Add missing legacy entries
  - iptables.fc: Remove some duplicate entries
  - iptables.fc: Remove duplicate file context entries
  - Allow libvirtd to create generic netlink sockets
  - Allow libvirtd the fsetid capability
  - Allow libvirtd to read /run/utmp
  - Dontaudit sys_ptrace capability when calling systemctl
  - Allow udisksd to read /dev/random
  - Allow udisksd to watch files under /run/mount
  - Allow udisksd to watch /etc
  - Allow crond to watch user_cron_spool_t directories
  - Allow accountsd watch xdm config directories
  - Label /etc/avahi with avahi_conf_t
  - Allow sssd get cgroup filesystems attributes and search cgroup dirs
  - Allow systemd-hostnamed read udev runtime data
  - Remove dev_getattr_sysfs_fs() interface calls for particular domains
  - Allow domain stat the /sys filesystem
  - Dontaudit NetworkManager write to initrc_tmp_t pipes
  - policykit.te: Clean up watch rule for policykit_auth_t
  - Revert further unnecessary watch rules
  - Revert "Allow getty watch its private runtime files"
  - Allow systemd watch generic /var directories
  - Allow init watch network config files and lnk_files
  - Allow systemd-sleep get attributes of fixed disk device nodes
  - Complete initial policy for systemd-coredump
  - Label SDC(scini) Dell Driver
  - Allow upowerd to send syslog messages
  - Remove the disk write permissions from tlp_t
  - Label NVMe devices as fixed_disk_device_t
  - Allow rhsmcertd bind tcp sockets to a generic node
  - Allow systemd-importd manage machines.lock file
* Tue Feb 16 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-3
  - Allow unconfined integrity lockdown permission
  - Relocate confidentiality lockdown rule from unconfined_domain_type to unconfined
  - Allow systemd-machined manage systemd-userdbd runtime sockets
  - Enable systemd-sysctl domtrans for udev
  - Introduce kernel_load_unsigned_module interface and use it for couple domains
  - Allow gpg watch user gpg secrets dirs
  - Build also the container module in CI
  - Remove duplicate code from kernel.te
  - Allow restorecond to watch all non-auth directories
  - Allow restorecond to watch its config file
* Mon Feb 15 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-2
  - Allow userdomain watch various filesystem objects
  - Allow systemd-logind and systemd-sleep integrity lockdown permission
  - Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
  - Allow pulseaudio watch devices and systemd-logind session dirs
  - Allow abrt-dump-journal-* watch generic log dirs and /run/log/journal dir
  - Remove duplicate files_mounton_etc(init_t) call
  - Add watch permissions to manage_* object permissions sets
  - Allow journalctl watch generic log dirs and /run/log/journal dir
  - Label /etc/resolv.conf as net_conf_t even when it's a symlink
  - Allow SSSD to watch /var/run/NetworkManager
  - Allow dnsmasq_t to watch /etc
  - Remove unnecessary lines from the new watch interfaces
  - Fix docstring for init_watch_dir()
  - Allow xdm watch its private lib dirs, /etc, /usr
* Thu Feb 11 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.8-1
  - Bump version as Fedora 34 has been branched off rawhide
  - Allow xdm watch its private lib dirs, /etc, /usr
  - Allow systemd-importd create /run/systemd/machines.lock file
  - Allow rhsmcertd_t read kpatch lib files
  - Add integrity lockdown permission into dev_read_raw_memory()
  - Add confidentiality lockdown permission into fs_rw_tracefs_files()
  - Allow gpsd read and write ptp4l_t shared memory.
  - Allow colord watch its private lib files and /usr
  - Allow init watch_reads mount PID files
  - Allow IPsec and Certmonger to use opencryptoki services
* Sun Feb 07 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-18
  - Allow lockdown confidentiality for domains using perf_event
  - define lockdown class and access
  - Add perfmon capability for all domains using perf_event
  - Allow ptp4l_t bpf capability to run bpf programs
  - Revert "Allow ptp4l_t sys_admin capability to run bpf programs"
  - access_vectors: Add new capabilities to cap2
  - Allow systemd and systemd-resolved watch dbus pid objects
  - Add new watch interfaces in the base and userdomain policy
  - Add watch permissions for contrib packages
  - Allow xdm watch /usr directories
  - Allow getty watch its private runtime files
  - Add watch permissions for nscd and sssd
  - Add watch permissions for firewalld and NetworkManager
  - Add watch permissions for syslogd
  - Add watch permissions for systemd services
  - Allow restorecond watch /etc dirs
  - Add watch permissions for user domain types
  - Add watch permissions for init
  - Add basic watch interfaces for systemd
  - Add basic watch interfaces to the base module
  - Add additional watch object permissions sets and patterns
  - Allow init_t to watch localization symlinks
  - Allow init_t to watch mount directories
  - Allow init_t to watch cgroup files
  - Add basic watch patterns
  - Add new watch* permissions
* Fri Feb 05 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-17
  - Update .copr/make-srpm.sh to use rawhide as DISTGIT_BRANCH
  - Dontaudit setsched for rndc
  - Allow systemd-logind destroy entries in message queue
  - Add userdom_destroy_unpriv_user_msgq() interface
  - ci: Install build dependencies from koji
  - Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
  - Add new cmadmin port for bfdd dameon
  - virtiofs supports Xattrs and SELinux
  - Allow domain write to systemd-resolved PID socket files
  - Label /var/run/pcsd-ruby.socket       socket with cluster_var_run_t type
  - Allow rhsmcertd_t domain transition to kpatch_t
  - Revert "Add kpatch_exec() interface"
  - Revert "Allow rhsmcertd execute kpatch"
  - Allow openvswitch create and use xfrm netlink sockets
  - Allow openvswitch_t perf_event write permission
  - Add kpatch_exec() interface
  - Allow rhsmcertd execute kpatch
  - Adds rule to allow glusterd to access RDMA socket
  - radius: Lexical sort of service-specific corenet rules by service name
  - VQP: Include IANA-assigned TCP/1589
  - radius: Allow binding to the VQP port (VMPS)
  - radius: Allow binding to the BDF Control and Echo ports
  - radius: Allow binding to the DHCP client port
  - radius: Allow net_raw; allow binding to the DHCP server ports
  - Add rsync_sys_admin tunable to allow rsync sys_admin capability
  - Allow staff_u run pam_console_apply
  - Allow openvswitch_t perf_event open permission
  - Allow sysadm read and write /dev/rfkill
  - Allow certmonger fsetid capability
  - Allow domain read usermodehelper state information
* Wed Jan 27 2021 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.7-16
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Fri Jan 22 2021 Petr Lautrbach <plautrba@redhat.com> - 3.14.7-15
  - Update specfile to not verify md5/size/mtime for active store files
  - Add /var/mnt equivalency to /mnt
  - Rebuild with SELinux userspace 3.2-rc1 release
* Fri Jan 08 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-14
  - Allow domain read usermodehelper state information
  - Remove all kernel_read_usermodehelper_state() interface calls
  - .copr: improve timestamp format
  - Allow wireshark create and use rdma socket
  - Allow domain stat /proc filesystem
  - Remove all kernel_getattr_proc() interface calls
  - Revert "Allow passwd to get attributes in proc_t"
  - Revert "Allow dovecot_auth_t stat /proc filesystem"
  - Revert "Allow sssd, unix_chkpwd, groupadd stat /proc filesystem"
  - Allow sssd read /run/systemd directory
  - Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t
* Thu Dec 17 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-13
  - Label /dev/isst_interface as cpu_device_t
  - Dontaudit firewalld dac_override capability
  - Allow ipsec set the context of a SPD entry to the default context
  - Build binary RPMs in CI
  - Add SRPM build scripts for COPR
* Tue Dec 15 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-12
  - Allow dovecot_auth_t stat /proc filesystem
  - Allow sysadm_u user and unconfined_domain_type manage perf_events
  - Allow pcp-pmcd manage perf_events
  - Add manage_perf_event_perms object permissions set
  - Add perf_event access vectors.
  - Allow sssd, unix_chkpwd, groupadd stat /proc filesystem
  - Allow stub-resolv.conf to be a symlink
  - sysnetwork.if: avoid directly referencing systemd_resolved_var_run_t
  - Create the systemd_dbus_chat_resolved() compatibility interface
  - Allow nsswitch-domain write to systemd-resolved PID socket files
  - Add systemd_resolved_write_pid_sock_files() interface
  - Add default file context for "/var/run/chrony-dhcp(/.*)?"
  - Allow timedatex dbus chat with cron system domain
  - Add cron_dbus_chat_system_job() interface
  - Allow systemd-logind manage init's pid files
* Wed Dec 09 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-11
  - Allow systemd-logind manage init's pid files
  - Allow tcsd the setgid capability
  - Allow systemd-resolved manage its private runtime symlinks
  - Update systemd_resolved_read_pid() to also read symlinks
  - Update systemd-sleep policy
  - Add groupadd_t fowner capability
  - Migrate to GitHub Actions
  - Update README.md to reflect the state after contrib and base merge
  - Add README.md announcing merging of selinux-policy and selinux-policy-contrib
  - Adapt .travis.yml to contrib merge
  - Merge contrib into the main repo
  - Prepare to merge contrib repo
  - Move stuff around to match the main repo
* Thu Nov 26 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-10
  - Allow Xephyr connect to 6000/tcp port and open user ptys
  - Allow kexec manage generic tmp files
  - Update targetd nfs & lvm
  - Add interface rpc_manage_exports
  - Merge selinux-policy and selinux-policy-contrib repos
* Tue Nov 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-9
  - Allow varnish map its private tmp files
  - Allow dovecot bind to smtp ports
  - Change fetchmail temporary files path to /var/spool/mail
  - Allow cups_pdf_t domain to communicate with unix_dgram_socket
  - Set file context for symlinks in /etc/httpd to etc_t
  - Allow rpmdb rw access to inherited console, ttys, and ptys
  - Allow dnsmasq read public files
  - Announce merging of selinux-policy and selinux-policy-contrib
  - Label /etc/resolv.conf as net_conf_t only if it is a plain file
  - Fix range for unreserved ports
  - Add files_search_non_security_dirs() interface
  - Introduce logging_syslogd_append_public_content tunable
  - Add miscfiles_append_public_files() interface
* Fri Nov 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-8
  - Set correct default file context for /usr/libexec/pcp/lib/*
  - Introduce rpmdb_t type
  - Allow slapd manage files/dirs in ldap certificates directory
  - Revert "Allow certmonger add new entries in a generic certificates directory"
  - Allow certmonger add new entries in a generic certificates directory
  - Allow slapd add new entries in ldap certificates directory
  - Remove retired PCP pmwebd and pmmgr daemons (since 5.0)
  - Let keepalived bind a raw socket
  - Add default file context for /usr/libexec/pcp/lib/*
  - squid: Allow net_raw capability when squid_use_tproxy is enabled
  - systemd: allow networkd to check namespaces
  - Add ability to read init_var_run_t where fs_read_efivarfs_files is allowed
  - Allow resolved to created varlink sockets and the domain to talk to it
  - selinux: tweak selinux_get_enforce_mode() to allow status page to be used
  - systemd: allow all systemd services to check selinux status
  - Set default file context for /var/lib/ipsec/nss
  - Allow user domains transition to rpmdb_t
  - Revert "Add miscfiles_add_entry_generic_cert_dirs() interface"
  - Revert "Add miscfiles_create_generic_cert_dirs() interface"
  - Update miscfiles_manage_all_certs() to include managing directories
  - Add miscfiles_create_generic_cert_dirs() interface
  - Add miscfiles_add_entry_generic_cert_dirs() interface
  - Revert "Label /var/run/zincati/public/motd.d/* as motd_var_run_t"
* Tue Nov 03 2020 Petr Lautrbach <plautrba@redhat.com> - 3.14.7-7
  - Rebuild with latest libsepol
  - Bump policy version to 33
* Thu Oct 22 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-6
  - rpc.fc: Include /etc/exports.d dir & files
  - Create chronyd_pid_filetrans() interface
  - Change invalid type redisd_t to redis_t in redis_stream_connect()
  - Revert "Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template"
  - Allow init dbus chat with kernel
  - Allow initrc_t create /run/chronyd-dhcp directory with a transition
  - Drop gcc from dependencies in Travis CI
  - fc_sort.py: Use "==" for comparing integers.
  - re-implement fc_sort in python
  - Remove invalid file context line
  - Drop git from dependencies in Travis CI
* Tue Oct 06 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-5
  - Remove empty line from rshd.fc
  - Allow systemd-logind read swap files
  - Add fstools_read_swap_files() interface
  - Allow dyntransition from sshd_t to unconfined_t
  - Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
* Fri Sep 25 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-4
  - Allow chronyd_t to accept and make NTS-KE connections
  - Allow domain write to an automount unnamed pipe
  - Label /var/run/zincati/public/motd.d/* as motd_var_run_t
  - Allow login programs to (only) read MOTD files and symlinks
  - Relabel /usr/sbin/charon-systemd as ipsec_exec_t
  - Confine systemd-sleep service
  - Add fstools_rw_swap_files() interface
  - Label 4460/tcp port as ntske_port_t
  - Add lvm_dbus_send_msg(), lvm_rw_var_run() interfaces

Files

/usr/share/doc/selinux-policy
/usr/share/doc/selinux-policy/Makefile.example
/usr/share/doc/selinux-policy/example.fc
/usr/share/doc/selinux-policy/example.if
/usr/share/doc/selinux-policy/example.te
/usr/share/doc/selinux-policy/html
/usr/share/doc/selinux-policy/html/admin.html
/usr/share/doc/selinux-policy/html/admin_bootloader.html
/usr/share/doc/selinux-policy/html/admin_consoletype.html
/usr/share/doc/selinux-policy/html/admin_dmesg.html
/usr/share/doc/selinux-policy/html/admin_netutils.html
/usr/share/doc/selinux-policy/html/admin_su.html
/usr/share/doc/selinux-policy/html/admin_sudo.html
/usr/share/doc/selinux-policy/html/admin_usermanage.html
/usr/share/doc/selinux-policy/html/apps.html
/usr/share/doc/selinux-policy/html/apps_seunshare.html
/usr/share/doc/selinux-policy/html/booleans.html
/usr/share/doc/selinux-policy/html/contrib.html
/usr/share/doc/selinux-policy/html/contrib_abrt.html
/usr/share/doc/selinux-policy/html/contrib_accountsd.html
/usr/share/doc/selinux-policy/html/contrib_acct.html
/usr/share/doc/selinux-policy/html/contrib_afs.html
/usr/share/doc/selinux-policy/html/contrib_aiccu.html
/usr/share/doc/selinux-policy/html/contrib_aide.html
/usr/share/doc/selinux-policy/html/contrib_aisexec.html
/usr/share/doc/selinux-policy/html/contrib_ajaxterm.html
/usr/share/doc/selinux-policy/html/contrib_alsa.html
/usr/share/doc/selinux-policy/html/contrib_amanda.html
/usr/share/doc/selinux-policy/html/contrib_amavis.html
/usr/share/doc/selinux-policy/html/contrib_amtu.html
/usr/share/doc/selinux-policy/html/contrib_anaconda.html
/usr/share/doc/selinux-policy/html/contrib_antivirus.html
/usr/share/doc/selinux-policy/html/contrib_apache.html
/usr/share/doc/selinux-policy/html/contrib_apcupsd.html
/usr/share/doc/selinux-policy/html/contrib_apm.html
/usr/share/doc/selinux-policy/html/contrib_apt.html
/usr/share/doc/selinux-policy/html/contrib_arpwatch.html
/usr/share/doc/selinux-policy/html/contrib_asterisk.html
/usr/share/doc/selinux-policy/html/contrib_authconfig.html
/usr/share/doc/selinux-policy/html/contrib_automount.html
/usr/share/doc/selinux-policy/html/contrib_avahi.html
/usr/share/doc/selinux-policy/html/contrib_awstats.html
/usr/share/doc/selinux-policy/html/contrib_backup.html
/usr/share/doc/selinux-policy/html/contrib_bacula.html
/usr/share/doc/selinux-policy/html/contrib_bcfg2.html
/usr/share/doc/selinux-policy/html/contrib_bind.html
/usr/share/doc/selinux-policy/html/contrib_bird.html
/usr/share/doc/selinux-policy/html/contrib_bitlbee.html
/usr/share/doc/selinux-policy/html/contrib_blkmapd.html
/usr/share/doc/selinux-policy/html/contrib_blueman.html
/usr/share/doc/selinux-policy/html/contrib_bluetooth.html
/usr/share/doc/selinux-policy/html/contrib_boinc.html
/usr/share/doc/selinux-policy/html/contrib_boltd.html
/usr/share/doc/selinux-policy/html/contrib_brctl.html
/usr/share/doc/selinux-policy/html/contrib_brltty.html
/usr/share/doc/selinux-policy/html/contrib_bugzilla.html
/usr/share/doc/selinux-policy/html/contrib_bumblebee.html
/usr/share/doc/selinux-policy/html/contrib_cachefilesd.html
/usr/share/doc/selinux-policy/html/contrib_calamaris.html
/usr/share/doc/selinux-policy/html/contrib_callweaver.html
/usr/share/doc/selinux-policy/html/contrib_canna.html
/usr/share/doc/selinux-policy/html/contrib_ccs.html
/usr/share/doc/selinux-policy/html/contrib_cdrecord.html
/usr/share/doc/selinux-policy/html/contrib_certmaster.html
/usr/share/doc/selinux-policy/html/contrib_certmonger.html
/usr/share/doc/selinux-policy/html/contrib_certwatch.html
/usr/share/doc/selinux-policy/html/contrib_cfengine.html
/usr/share/doc/selinux-policy/html/contrib_cgroup.html
/usr/share/doc/selinux-policy/html/contrib_chrome.html
/usr/share/doc/selinux-policy/html/contrib_chronyd.html
/usr/share/doc/selinux-policy/html/contrib_cinder.html
/usr/share/doc/selinux-policy/html/contrib_cipe.html
/usr/share/doc/selinux-policy/html/contrib_clamav.html
/usr/share/doc/selinux-policy/html/contrib_clockspeed.html
/usr/share/doc/selinux-policy/html/contrib_clogd.html
/usr/share/doc/selinux-policy/html/contrib_cloudform.html
/usr/share/doc/selinux-policy/html/contrib_cmirrord.html
/usr/share/doc/selinux-policy/html/contrib_cobbler.html
/usr/share/doc/selinux-policy/html/contrib_cockpit.html
/usr/share/doc/selinux-policy/html/contrib_collectd.html
/usr/share/doc/selinux-policy/html/contrib_colord.html
/usr/share/doc/selinux-policy/html/contrib_comsat.html
/usr/share/doc/selinux-policy/html/contrib_condor.html
/usr/share/doc/selinux-policy/html/contrib_conman.html
/usr/share/doc/selinux-policy/html/contrib_conntrackd.html
/usr/share/doc/selinux-policy/html/contrib_consolekit.html
/usr/share/doc/selinux-policy/html/contrib_container.html
/usr/share/doc/selinux-policy/html/contrib_corosync.html
/usr/share/doc/selinux-policy/html/contrib_couchdb.html
/usr/share/doc/selinux-policy/html/contrib_courier.html
/usr/share/doc/selinux-policy/html/contrib_cpucontrol.html
/usr/share/doc/selinux-policy/html/contrib_cpufreqselector.html
/usr/share/doc/selinux-policy/html/contrib_cpuplug.html
/usr/share/doc/selinux-policy/html/contrib_cron.html
/usr/share/doc/selinux-policy/html/contrib_ctdb.html
/usr/share/doc/selinux-policy/html/contrib_cups.html
/usr/share/doc/selinux-policy/html/contrib_cvs.html
/usr/share/doc/selinux-policy/html/contrib_cyphesis.html
/usr/share/doc/selinux-policy/html/contrib_cyrus.html
/usr/share/doc/selinux-policy/html/contrib_daemontools.html
/usr/share/doc/selinux-policy/html/contrib_dante.html
/usr/share/doc/selinux-policy/html/contrib_dbadm.html
/usr/share/doc/selinux-policy/html/contrib_dbskk.html
/usr/share/doc/selinux-policy/html/contrib_dbus.html
/usr/share/doc/selinux-policy/html/contrib_dcc.html
/usr/share/doc/selinux-policy/html/contrib_ddclient.html
/usr/share/doc/selinux-policy/html/contrib_ddcprobe.html
/usr/share/doc/selinux-policy/html/contrib_denyhosts.html
/usr/share/doc/selinux-policy/html/contrib_devicekit.html
/usr/share/doc/selinux-policy/html/contrib_dhcp.html
/usr/share/doc/selinux-policy/html/contrib_dictd.html
/usr/share/doc/selinux-policy/html/contrib_dirmngr.html
/usr/share/doc/selinux-policy/html/contrib_dirsrv-admin.html
/usr/share/doc/selinux-policy/html/contrib_dirsrv.html
/usr/share/doc/selinux-policy/html/contrib_distcc.html
/usr/share/doc/selinux-policy/html/contrib_djbdns.html
/usr/share/doc/selinux-policy/html/contrib_dkim.html
/usr/share/doc/selinux-policy/html/contrib_dmidecode.html
/usr/share/doc/selinux-policy/html/contrib_dnsmasq.html
/usr/share/doc/selinux-policy/html/contrib_dnssec.html
/usr/share/doc/selinux-policy/html/contrib_dovecot.html
/usr/share/doc/selinux-policy/html/contrib_dpkg.html
/usr/share/doc/selinux-policy/html/contrib_drbd.html
/usr/share/doc/selinux-policy/html/contrib_dspam.html
/usr/share/doc/selinux-policy/html/contrib_entropyd.html
/usr/share/doc/selinux-policy/html/contrib_evolution.html
/usr/share/doc/selinux-policy/html/contrib_exim.html
/usr/share/doc/selinux-policy/html/contrib_fail2ban.html
/usr/share/doc/selinux-policy/html/contrib_fcoe.html
/usr/share/doc/selinux-policy/html/contrib_fedoratp.html
/usr/share/doc/selinux-policy/html/contrib_fetchmail.html
/usr/share/doc/selinux-policy/html/contrib_finger.html
/usr/share/doc/selinux-policy/html/contrib_firewalld.html
/usr/share/doc/selinux-policy/html/contrib_firewallgui.html
/usr/share/doc/selinux-policy/html/contrib_firstboot.html
/usr/share/doc/selinux-policy/html/contrib_fprintd.html
/usr/share/doc/selinux-policy/html/contrib_freeipmi.html
/usr/share/doc/selinux-policy/html/contrib_freqset.html
/usr/share/doc/selinux-policy/html/contrib_ftp.html
/usr/share/doc/selinux-policy/html/contrib_fwupd.html
/usr/share/doc/selinux-policy/html/contrib_games.html
/usr/share/doc/selinux-policy/html/contrib_gatekeeper.html
/usr/share/doc/selinux-policy/html/contrib_gdomap.html
/usr/share/doc/selinux-policy/html/contrib_geoclue.html
/usr/share/doc/selinux-policy/html/contrib_git.html
/usr/share/doc/selinux-policy/html/contrib_gitosis.html
/usr/share/doc/selinux-policy/html/contrib_glance.html
/usr/share/doc/selinux-policy/html/contrib_glusterd.html
/usr/share/doc/selinux-policy/html/contrib_gnome.html
/usr/share/doc/selinux-policy/html/contrib_gnomeclock.html
/usr/share/doc/selinux-policy/html/contrib_gpg.html
/usr/share/doc/selinux-policy/html/contrib_gpm.html
/usr/share/doc/selinux-policy/html/contrib_gpsd.html
/usr/share/doc/selinux-policy/html/contrib_gssproxy.html
/usr/share/doc/selinux-policy/html/contrib_hadoop.html
/usr/share/doc/selinux-policy/html/contrib_hddtemp.html
/usr/share/doc/selinux-policy/html/contrib_hostapd.html
/usr/share/doc/selinux-policy/html/contrib_howl.html
/usr/share/doc/selinux-policy/html/contrib_hsqldb.html
/usr/share/doc/selinux-policy/html/contrib_hwloc.html
/usr/share/doc/selinux-policy/html/contrib_hypervkvp.html
/usr/share/doc/selinux-policy/html/contrib_i18n_input.html
/usr/share/doc/selinux-policy/html/contrib_ibacm.html
/usr/share/doc/selinux-policy/html/contrib_ica.html
/usr/share/doc/selinux-policy/html/contrib_icecast.html
/usr/share/doc/selinux-policy/html/contrib_ifplugd.html
/usr/share/doc/selinux-policy/html/contrib_imaze.html
/usr/share/doc/selinux-policy/html/contrib_inetd.html
/usr/share/doc/selinux-policy/html/contrib_inn.html
/usr/share/doc/selinux-policy/html/contrib_insights_client.html
/usr/share/doc/selinux-policy/html/contrib_iodine.html
/usr/share/doc/selinux-policy/html/contrib_iotop.html
/usr/share/doc/selinux-policy/html/contrib_ipa.html
/usr/share/doc/selinux-policy/html/contrib_ipmievd.html
/usr/share/doc/selinux-policy/html/contrib_irc.html
/usr/share/doc/selinux-policy/html/contrib_ircd.html
/usr/share/doc/selinux-policy/html/contrib_irqbalance.html
/usr/share/doc/selinux-policy/html/contrib_iscsi.html
/usr/share/doc/selinux-policy/html/contrib_isns.html
/usr/share/doc/selinux-policy/html/contrib_jabber.html
/usr/share/doc/selinux-policy/html/contrib_java.html
/usr/share/doc/selinux-policy/html/contrib_jetty.html
/usr/share/doc/selinux-policy/html/contrib_jockey.html
/usr/share/doc/selinux-policy/html/contrib_journalctl.html
/usr/share/doc/selinux-policy/html/contrib_kdump.html
/usr/share/doc/selinux-policy/html/contrib_kdumpgui.html
/usr/share/doc/selinux-policy/html/contrib_keepalived.html
/usr/share/doc/selinux-policy/html/contrib_kerberos.html
/usr/share/doc/selinux-policy/html/contrib_kerneloops.html
/usr/share/doc/selinux-policy/html/contrib_keyboardd.html
/usr/share/doc/selinux-policy/html/contrib_keystone.html
/usr/share/doc/selinux-policy/html/contrib_kismet.html
/usr/share/doc/selinux-policy/html/contrib_kmscon.html
/usr/share/doc/selinux-policy/html/contrib_kpatch.html
/usr/share/doc/selinux-policy/html/contrib_ksmtuned.html
/usr/share/doc/selinux-policy/html/contrib_ktalk.html
/usr/share/doc/selinux-policy/html/contrib_l2tp.html
/usr/share/doc/selinux-policy/html/contrib_ldap.html
/usr/share/doc/selinux-policy/html/contrib_lightsquid.html
/usr/share/doc/selinux-policy/html/contrib_likewise.html
/usr/share/doc/selinux-policy/html/contrib_linuxptp.html
/usr/share/doc/selinux-policy/html/contrib_lircd.html
/usr/share/doc/selinux-policy/html/contrib_livecd.html
/usr/share/doc/selinux-policy/html/contrib_lldpad.html
/usr/share/doc/selinux-policy/html/contrib_loadkeys.html
/usr/share/doc/selinux-policy/html/contrib_lockdev.html
/usr/share/doc/selinux-policy/html/contrib_logrotate.html
/usr/share/doc/selinux-policy/html/contrib_logwatch.html
/usr/share/doc/selinux-policy/html/contrib_lpd.html
/usr/share/doc/selinux-policy/html/contrib_lsm.html
/usr/share/doc/selinux-policy/html/contrib_lttng-tools.html
/usr/share/doc/selinux-policy/html/contrib_mailman.html
/usr/share/doc/selinux-policy/html/contrib_mailscanner.html
/usr/share/doc/selinux-policy/html/contrib_man2html.html
/usr/share/doc/selinux-policy/html/contrib_mandb.html
/usr/share/doc/selinux-policy/html/contrib_mcelog.html
/usr/share/doc/selinux-policy/html/contrib_mediawiki.html
/usr/share/doc/selinux-policy/html/contrib_memcached.html
/usr/share/doc/selinux-policy/html/contrib_milter.html
/usr/share/doc/selinux-policy/html/contrib_minidlna.html
/usr/share/doc/selinux-policy/html/contrib_minissdpd.html
/usr/share/doc/selinux-policy/html/contrib_mip6d.html
/usr/share/doc/selinux-policy/html/contrib_mirrormanager.html
/usr/share/doc/selinux-policy/html/contrib_mock.html
/usr/share/doc/selinux-policy/html/contrib_modemmanager.html
/usr/share/doc/selinux-policy/html/contrib_mojomojo.html
/usr/share/doc/selinux-policy/html/contrib_mon_statd.html
/usr/share/doc/selinux-policy/html/contrib_mongodb.html
/usr/share/doc/selinux-policy/html/contrib_mono.html
/usr/share/doc/selinux-policy/html/contrib_monop.html
/usr/share/doc/selinux-policy/html/contrib_motion.html
/usr/share/doc/selinux-policy/html/contrib_mozilla.html
/usr/share/doc/selinux-policy/html/contrib_mpd.html
/usr/share/doc/selinux-policy/html/contrib_mplayer.html
/usr/share/doc/selinux-policy/html/contrib_mrtg.html
/usr/share/doc/selinux-policy/html/contrib_mta.html
/usr/share/doc/selinux-policy/html/contrib_munin.html
/usr/share/doc/selinux-policy/html/contrib_mysql.html
/usr/share/doc/selinux-policy/html/contrib_mythtv.html
/usr/share/doc/selinux-policy/html/contrib_naemon.html
/usr/share/doc/selinux-policy/html/contrib_nagios.html
/usr/share/doc/selinux-policy/html/contrib_namespace.html
/usr/share/doc/selinux-policy/html/contrib_ncftool.html
/usr/share/doc/selinux-policy/html/contrib_nessus.html
/usr/share/doc/selinux-policy/html/contrib_networkmanager.html
/usr/share/doc/selinux-policy/html/contrib_ninfod.html
/usr/share/doc/selinux-policy/html/contrib_nis.html
/usr/share/doc/selinux-policy/html/contrib_nova.html
/usr/share/doc/selinux-policy/html/contrib_nscd.html
/usr/share/doc/selinux-policy/html/contrib_nsd.html
/usr/share/doc/selinux-policy/html/contrib_nslcd.html
/usr/share/doc/selinux-policy/html/contrib_ntop.html
/usr/share/doc/selinux-policy/html/contrib_ntp.html
/usr/share/doc/selinux-policy/html/contrib_numad.html
/usr/share/doc/selinux-policy/html/contrib_nut.html
/usr/share/doc/selinux-policy/html/contrib_nx.html
/usr/share/doc/selinux-policy/html/contrib_oav.html
/usr/share/doc/selinux-policy/html/contrib_obex.html
/usr/share/doc/selinux-policy/html/contrib_oddjob.html
/usr/share/doc/selinux-policy/html/contrib_oident.html
/usr/share/doc/selinux-policy/html/contrib_opafm.html
/usr/share/doc/selinux-policy/html/contrib_openca.html
/usr/share/doc/selinux-policy/html/contrib_openct.html
/usr/share/doc/selinux-policy/html/contrib_opendnssec.html
/usr/share/doc/selinux-policy/html/contrib_openfortivpn.html
/usr/share/doc/selinux-policy/html/contrib_openhpid.html
/usr/share/doc/selinux-policy/html/contrib_openshift-origin.html
/usr/share/doc/selinux-policy/html/contrib_openshift.html
/usr/share/doc/selinux-policy/html/contrib_opensm.html
/usr/share/doc/selinux-policy/html/contrib_openvpn.html
/usr/share/doc/selinux-policy/html/contrib_openvswitch.html
/usr/share/doc/selinux-policy/html/contrib_openwsman.html
/usr/share/doc/selinux-policy/html/contrib_oracleasm.html
/usr/share/doc/selinux-policy/html/contrib_osad.html
/usr/share/doc/selinux-policy/html/contrib_pacemaker.html
/usr/share/doc/selinux-policy/html/contrib_pads.html
/usr/share/doc/selinux-policy/html/contrib_passenger.html
/usr/share/doc/selinux-policy/html/contrib_pcmcia.html
/usr/share/doc/selinux-policy/html/contrib_pcp.html
/usr/share/doc/selinux-policy/html/contrib_pcscd.html
/usr/share/doc/selinux-policy/html/contrib_pdns.html
/usr/share/doc/selinux-policy/html/contrib_pegasus.html
/usr/share/doc/selinux-policy/html/contrib_perdition.html
/usr/share/doc/selinux-policy/html/contrib_pesign.html
/usr/share/doc/selinux-policy/html/contrib_pingd.html
/usr/share/doc/selinux-policy/html/contrib_piranha.html
/usr/share/doc/selinux-policy/html/contrib_pkcs.html
/usr/share/doc/selinux-policy/html/contrib_pkcs11proxyd.html
/usr/share/doc/selinux-policy/html/contrib_pki.html
/usr/share/doc/selinux-policy/html/contrib_plymouthd.html
/usr/share/doc/selinux-policy/html/contrib_podsleuth.html
/usr/share/doc/selinux-policy/html/contrib_policykit.html
/usr/share/doc/selinux-policy/html/contrib_polipo.html
/usr/share/doc/selinux-policy/html/contrib_portage.html
/usr/share/doc/selinux-policy/html/contrib_portmap.html
/usr/share/doc/selinux-policy/html/contrib_portreserve.html
/usr/share/doc/selinux-policy/html/contrib_portslave.html
/usr/share/doc/selinux-policy/html/contrib_postfix.html
/usr/share/doc/selinux-policy/html/contrib_postfixpolicyd.html
/usr/share/doc/selinux-policy/html/contrib_postgrey.html
/usr/share/doc/selinux-policy/html/contrib_ppp.html
/usr/share/doc/selinux-policy/html/contrib_prelink.html
/usr/share/doc/selinux-policy/html/contrib_prelude.html
/usr/share/doc/selinux-policy/html/contrib_privoxy.html
/usr/share/doc/selinux-policy/html/contrib_procmail.html
/usr/share/doc/selinux-policy/html/contrib_prosody.html
/usr/share/doc/selinux-policy/html/contrib_psad.html
/usr/share/doc/selinux-policy/html/contrib_ptchown.html
/usr/share/doc/selinux-policy/html/contrib_publicfile.html
/usr/share/doc/selinux-policy/html/contrib_pulseaudio.html
/usr/share/doc/selinux-policy/html/contrib_puppet.html
/usr/share/doc/selinux-policy/html/contrib_pwauth.html
/usr/share/doc/selinux-policy/html/contrib_pxe.html
/usr/share/doc/selinux-policy/html/contrib_pyzor.html
/usr/share/doc/selinux-policy/html/contrib_qemu.html
/usr/share/doc/selinux-policy/html/contrib_qmail.html
/usr/share/doc/selinux-policy/html/contrib_qpid.html
/usr/share/doc/selinux-policy/html/contrib_quantum.html
/usr/share/doc/selinux-policy/html/contrib_quota.html
/usr/share/doc/selinux-policy/html/contrib_rabbitmq.html
/usr/share/doc/selinux-policy/html/contrib_radius.html
/usr/share/doc/selinux-policy/html/contrib_radvd.html
/usr/share/doc/selinux-policy/html/contrib_raid.html
/usr/share/doc/selinux-policy/html/contrib_rasdaemon.html
/usr/share/doc/selinux-policy/html/contrib_razor.html
/usr/share/doc/selinux-policy/html/contrib_rdisc.html
/usr/share/doc/selinux-policy/html/contrib_readahead.html
/usr/share/doc/selinux-policy/html/contrib_realmd.html
/usr/share/doc/selinux-policy/html/contrib_redis.html
/usr/share/doc/selinux-policy/html/contrib_remotelogin.html
/usr/share/doc/selinux-policy/html/contrib_resmgr.html
/usr/share/doc/selinux-policy/html/contrib_rgmanager.html
/usr/share/doc/selinux-policy/html/contrib_rhcd.html
/usr/share/doc/selinux-policy/html/contrib_rhcs.html
/usr/share/doc/selinux-policy/html/contrib_rhev.html
/usr/share/doc/selinux-policy/html/contrib_rhgb.html
/usr/share/doc/selinux-policy/html/contrib_rhnsd.html
/usr/share/doc/selinux-policy/html/contrib_rhsmcertd.html
/usr/share/doc/selinux-policy/html/contrib_ricci.html
/usr/share/doc/selinux-policy/html/contrib_rkhunter.html
/usr/share/doc/selinux-policy/html/contrib_rkt.html
/usr/share/doc/selinux-policy/html/contrib_rlogin.html
/usr/share/doc/selinux-policy/html/contrib_rngd.html
/usr/share/doc/selinux-policy/html/contrib_rolekit.html
/usr/share/doc/selinux-policy/html/contrib_roundup.html
/usr/share/doc/selinux-policy/html/contrib_rpc.html
/usr/share/doc/selinux-policy/html/contrib_rpcbind.html
/usr/share/doc/selinux-policy/html/contrib_rpm.html
/usr/share/doc/selinux-policy/html/contrib_rrdcached.html
/usr/share/doc/selinux-policy/html/contrib_rshd.html
/usr/share/doc/selinux-policy/html/contrib_rssh.html
/usr/share/doc/selinux-policy/html/contrib_rsync.html
/usr/share/doc/selinux-policy/html/contrib_rtas.html
/usr/share/doc/selinux-policy/html/contrib_rtkit.html
/usr/share/doc/selinux-policy/html/contrib_rwho.html
/usr/share/doc/selinux-policy/html/contrib_samba.html
/usr/share/doc/selinux-policy/html/contrib_sambagui.html
/usr/share/doc/selinux-policy/html/contrib_samhain.html
/usr/share/doc/selinux-policy/html/contrib_sandbox.html
/usr/share/doc/selinux-policy/html/contrib_sandboxX.html
/usr/share/doc/selinux-policy/html/contrib_sanlock.html
/usr/share/doc/selinux-policy/html/contrib_sasl.html
/usr/share/doc/selinux-policy/html/contrib_sbd.html
/usr/share/doc/selinux-policy/html/contrib_sblim.html
/usr/share/doc/selinux-policy/html/contrib_screen.html
/usr/share/doc/selinux-policy/html/contrib_sectoolm.html
/usr/share/doc/selinux-policy/html/contrib_sendmail.html
/usr/share/doc/selinux-policy/html/contrib_sensord.html
/usr/share/doc/selinux-policy/html/contrib_setroubleshoot.html
/usr/share/doc/selinux-policy/html/contrib_sge.html
/usr/share/doc/selinux-policy/html/contrib_shorewall.html
/usr/share/doc/selinux-policy/html/contrib_shutdown.html
/usr/share/doc/selinux-policy/html/contrib_slocate.html
/usr/share/doc/selinux-policy/html/contrib_slpd.html
/usr/share/doc/selinux-policy/html/contrib_slrnpull.html
/usr/share/doc/selinux-policy/html/contrib_smartmon.html
/usr/share/doc/selinux-policy/html/contrib_smokeping.html
/usr/share/doc/selinux-policy/html/contrib_smoltclient.html
/usr/share/doc/selinux-policy/html/contrib_smsd.html
/usr/share/doc/selinux-policy/html/contrib_smstools.html
/usr/share/doc/selinux-policy/html/contrib_snapper.html
/usr/share/doc/selinux-policy/html/contrib_snmp.html
/usr/share/doc/selinux-policy/html/contrib_snort.html
/usr/share/doc/selinux-policy/html/contrib_sosreport.html
/usr/share/doc/selinux-policy/html/contrib_soundserver.html
/usr/share/doc/selinux-policy/html/contrib_spamassassin.html
/usr/share/doc/selinux-policy/html/contrib_speech-dispatcher.html
/usr/share/doc/selinux-policy/html/contrib_squid.html
/usr/share/doc/selinux-policy/html/contrib_sslh.html
/usr/share/doc/selinux-policy/html/contrib_sssd.html
/usr/share/doc/selinux-policy/html/contrib_stalld.html
/usr/share/doc/selinux-policy/html/contrib_stapserver.html
/usr/share/doc/selinux-policy/html/contrib_stratisd.html
/usr/share/doc/selinux-policy/html/contrib_stunnel.html
/usr/share/doc/selinux-policy/html/contrib_svnserve.html
/usr/share/doc/selinux-policy/html/contrib_swift.html
/usr/share/doc/selinux-policy/html/contrib_sxid.html
/usr/share/doc/selinux-policy/html/contrib_sysstat.html
/usr/share/doc/selinux-policy/html/contrib_tangd.html
/usr/share/doc/selinux-policy/html/contrib_targetd.html
/usr/share/doc/selinux-policy/html/contrib_tcpd.html
/usr/share/doc/selinux-policy/html/contrib_tcsd.html
/usr/share/doc/selinux-policy/html/contrib_telepathy.html
/usr/share/doc/selinux-policy/html/contrib_telnet.html
/usr/share/doc/selinux-policy/html/contrib_tftp.html
/usr/share/doc/selinux-policy/html/contrib_tgtd.html
/usr/share/doc/selinux-policy/html/contrib_thin.html
/usr/share/doc/selinux-policy/html/contrib_thumb.html
/usr/share/doc/selinux-policy/html/contrib_thunderbird.html
/usr/share/doc/selinux-policy/html/contrib_timedatex.html
/usr/share/doc/selinux-policy/html/contrib_timidity.html
/usr/share/doc/selinux-policy/html/contrib_tlp.html
/usr/share/doc/selinux-policy/html/contrib_tmpreaper.html
/usr/share/doc/selinux-policy/html/contrib_tomcat.html
/usr/share/doc/selinux-policy/html/contrib_tor.html
/usr/share/doc/selinux-policy/html/contrib_transproxy.html
/usr/share/doc/selinux-policy/html/contrib_tripwire.html
/usr/share/doc/selinux-policy/html/contrib_tuned.html
/usr/share/doc/selinux-policy/html/contrib_tvtime.html
/usr/share/doc/selinux-policy/html/contrib_tzdata.html
/usr/share/doc/selinux-policy/html/contrib_ucspitcp.html
/usr/share/doc/selinux-policy/html/contrib_ulogd.html
/usr/share/doc/selinux-policy/html/contrib_uml.html
/usr/share/doc/selinux-policy/html/contrib_updfstab.html
/usr/share/doc/selinux-policy/html/contrib_uptime.html
/usr/share/doc/selinux-policy/html/contrib_usbmodules.html
/usr/share/doc/selinux-policy/html/contrib_usbmuxd.html
/usr/share/doc/selinux-policy/html/contrib_userhelper.html
/usr/share/doc/selinux-policy/html/contrib_usernetctl.html
/usr/share/doc/selinux-policy/html/contrib_uucp.html
/usr/share/doc/selinux-policy/html/contrib_uuidd.html
/usr/share/doc/selinux-policy/html/contrib_uwimap.html
/usr/share/doc/selinux-policy/html/contrib_varnishd.html
/usr/share/doc/selinux-policy/html/contrib_vbetool.html
/usr/share/doc/selinux-policy/html/contrib_vdagent.html
/usr/share/doc/selinux-policy/html/contrib_vhostmd.html
/usr/share/doc/selinux-policy/html/contrib_virt.html
/usr/share/doc/selinux-policy/html/contrib_vlock.html
/usr/share/doc/selinux-policy/html/contrib_vmtools.html
/usr/share/doc/selinux-policy/html/contrib_vmware.html
/usr/share/doc/selinux-policy/html/contrib_vnstatd.html
/usr/share/doc/selinux-policy/html/contrib_vpn.html
/usr/share/doc/selinux-policy/html/contrib_w3c.html
/usr/share/doc/selinux-policy/html/contrib_watchdog.html
/usr/share/doc/selinux-policy/html/contrib_wdmd.html
/usr/share/doc/selinux-policy/html/contrib_webadm.html
/usr/share/doc/selinux-policy/html/contrib_webalizer.html
/usr/share/doc/selinux-policy/html/contrib_wine.html
/usr/share/doc/selinux-policy/html/contrib_wireguard.html
/usr/share/doc/selinux-policy/html/contrib_wireshark.html
/usr/share/doc/selinux-policy/html/contrib_wm.html
/usr/share/doc/selinux-policy/html/contrib_xen.html
/usr/share/doc/selinux-policy/html/contrib_xfs.html
/usr/share/doc/selinux-policy/html/contrib_xscreensaver.html
/usr/share/doc/selinux-policy/html/contrib_zabbix.html
/usr/share/doc/selinux-policy/html/contrib_zarafa.html
/usr/share/doc/selinux-policy/html/contrib_zebra.html
/usr/share/doc/selinux-policy/html/contrib_zoneminder.html
/usr/share/doc/selinux-policy/html/contrib_zosremote.html
/usr/share/doc/selinux-policy/html/global_booleans.html
/usr/share/doc/selinux-policy/html/global_tunables.html
/usr/share/doc/selinux-policy/html/index.html
/usr/share/doc/selinux-policy/html/interfaces.html
/usr/share/doc/selinux-policy/html/kernel.html
/usr/share/doc/selinux-policy/html/kernel_corecommands.html
/usr/share/doc/selinux-policy/html/kernel_corenetwork.html
/usr/share/doc/selinux-policy/html/kernel_devices.html
/usr/share/doc/selinux-policy/html/kernel_domain.html
/usr/share/doc/selinux-policy/html/kernel_files.html
/usr/share/doc/selinux-policy/html/kernel_filesystem.html
/usr/share/doc/selinux-policy/html/kernel_kernel.html
/usr/share/doc/selinux-policy/html/kernel_mcs.html
/usr/share/doc/selinux-policy/html/kernel_mls.html
/usr/share/doc/selinux-policy/html/kernel_selinux.html
/usr/share/doc/selinux-policy/html/kernel_storage.html
/usr/share/doc/selinux-policy/html/kernel_terminal.html
/usr/share/doc/selinux-policy/html/kernel_ubac.html
/usr/share/doc/selinux-policy/html/kernel_unlabelednet.html
/usr/share/doc/selinux-policy/html/roles.html
/usr/share/doc/selinux-policy/html/roles_auditadm.html
/usr/share/doc/selinux-policy/html/roles_guest.html
/usr/share/doc/selinux-policy/html/roles_logadm.html
/usr/share/doc/selinux-policy/html/roles_secadm.html
/usr/share/doc/selinux-policy/html/roles_staff.html
/usr/share/doc/selinux-policy/html/roles_sysadm.html
/usr/share/doc/selinux-policy/html/roles_sysadm_secadm.html
/usr/share/doc/selinux-policy/html/roles_unconfineduser.html
/usr/share/doc/selinux-policy/html/roles_unprivuser.html
/usr/share/doc/selinux-policy/html/roles_xguest.html
/usr/share/doc/selinux-policy/html/services.html
/usr/share/doc/selinux-policy/html/services_postgresql.html
/usr/share/doc/selinux-policy/html/services_ssh.html
/usr/share/doc/selinux-policy/html/services_xserver.html
/usr/share/doc/selinux-policy/html/style.css
/usr/share/doc/selinux-policy/html/system.html
/usr/share/doc/selinux-policy/html/system_application.html
/usr/share/doc/selinux-policy/html/system_authlogin.html
/usr/share/doc/selinux-policy/html/system_clock.html
/usr/share/doc/selinux-policy/html/system_fstools.html
/usr/share/doc/selinux-policy/html/system_getty.html
/usr/share/doc/selinux-policy/html/system_hostname.html
/usr/share/doc/selinux-policy/html/system_init.html
/usr/share/doc/selinux-policy/html/system_ipsec.html
/usr/share/doc/selinux-policy/html/system_iptables.html
/usr/share/doc/selinux-policy/html/system_libraries.html
/usr/share/doc/selinux-policy/html/system_locallogin.html
/usr/share/doc/selinux-policy/html/system_logging.html
/usr/share/doc/selinux-policy/html/system_lvm.html
/usr/share/doc/selinux-policy/html/system_miscfiles.html
/usr/share/doc/selinux-policy/html/system_modutils.html
/usr/share/doc/selinux-policy/html/system_mount.html
/usr/share/doc/selinux-policy/html/system_netlabel.html
/usr/share/doc/selinux-policy/html/system_selinuxutil.html
/usr/share/doc/selinux-policy/html/system_setrans.html
/usr/share/doc/selinux-policy/html/system_sysnetwork.html
/usr/share/doc/selinux-policy/html/system_systemd.html
/usr/share/doc/selinux-policy/html/system_udev.html
/usr/share/doc/selinux-policy/html/system_unconfined.html
/usr/share/doc/selinux-policy/html/system_userdomain.html
/usr/share/doc/selinux-policy/html/templates.html
/usr/share/doc/selinux-policy/html/tunables.html
/usr/share/man/man8/NetworkManager_dispatcher_chronyc_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_cloud_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_console_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_custom_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_ddclient_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_dhclient_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_dnssec_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_iscsid_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_sendmail_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_tlp_selinux.8.gz
/usr/share/man/man8/NetworkManager_dispatcher_winbind_selinux.8.gz
/usr/share/man/man8/NetworkManager_priv_helper_selinux.8.gz
/usr/share/man/man8/NetworkManager_selinux.8.gz
/usr/share/man/man8/NetworkManager_ssh_selinux.8.gz
/usr/share/man/man8/_selinux.8.gz
/usr/share/man/man8/abrt_dump_oops_selinux.8.gz
/usr/share/man/man8/abrt_handle_event_selinux.8.gz
/usr/share/man/man8/abrt_helper_selinux.8.gz
/usr/share/man/man8/abrt_retrace_coredump_selinux.8.gz
/usr/share/man/man8/abrt_retrace_worker_selinux.8.gz
/usr/share/man/man8/abrt_selinux.8.gz
/usr/share/man/man8/abrt_upload_watch_selinux.8.gz
/usr/share/man/man8/abrt_watch_log_selinux.8.gz
/usr/share/man/man8/accountsd_selinux.8.gz
/usr/share/man/man8/acct_selinux.8.gz
/usr/share/man/man8/admin_crontab_selinux.8.gz
/usr/share/man/man8/afs_bosserver_selinux.8.gz
/usr/share/man/man8/afs_fsserver_selinux.8.gz
/usr/share/man/man8/afs_kaserver_selinux.8.gz
/usr/share/man/man8/afs_ptserver_selinux.8.gz
/usr/share/man/man8/afs_selinux.8.gz
/usr/share/man/man8/afs_vlserver_selinux.8.gz
/usr/share/man/man8/aiccu_selinux.8.gz
/usr/share/man/man8/aide_selinux.8.gz
/usr/share/man/man8/aisexec_selinux.8.gz
/usr/share/man/man8/ajaxterm_selinux.8.gz
/usr/share/man/man8/ajaxterm_ssh_selinux.8.gz
/usr/share/man/man8/alsa_selinux.8.gz
/usr/share/man/man8/amanda_recover_selinux.8.gz
/usr/share/man/man8/amanda_selinux.8.gz
/usr/share/man/man8/amavis_selinux.8.gz
/usr/share/man/man8/amtu_selinux.8.gz
/usr/share/man/man8/anaconda_selinux.8.gz
/usr/share/man/man8/anon_sftpd_selinux.8.gz
/usr/share/man/man8/antivirus_selinux.8.gz
/usr/share/man/man8/apache_selinux.8.gz
/usr/share/man/man8/apcupsd_cgi_script_selinux.8.gz
/usr/share/man/man8/apcupsd_selinux.8.gz
/usr/share/man/man8/apm_selinux.8.gz
/usr/share/man/man8/apmd_selinux.8.gz
/usr/share/man/man8/arpwatch_selinux.8.gz
/usr/share/man/man8/asterisk_selinux.8.gz
/usr/share/man/man8/audisp_remote_selinux.8.gz
/usr/share/man/man8/audisp_selinux.8.gz
/usr/share/man/man8/auditadm_screen_selinux.8.gz
/usr/share/man/man8/auditadm_selinux.8.gz
/usr/share/man/man8/auditadm_su_selinux.8.gz
/usr/share/man/man8/auditadm_sudo_selinux.8.gz
/usr/share/man/man8/auditctl_selinux.8.gz
/usr/share/man/man8/auditd_selinux.8.gz
/usr/share/man/man8/authconfig_selinux.8.gz
/usr/share/man/man8/automount_selinux.8.gz
/usr/share/man/man8/avahi_selinux.8.gz
/usr/share/man/man8/awstats_script_selinux.8.gz
/usr/share/man/man8/awstats_selinux.8.gz
/usr/share/man/man8/bacula_admin_selinux.8.gz
/usr/share/man/man8/bacula_selinux.8.gz
/usr/share/man/man8/bacula_unconfined_script_selinux.8.gz
/usr/share/man/man8/bcfg2_selinux.8.gz
/usr/share/man/man8/bind_selinux.8.gz
/usr/share/man/man8/bitlbee_selinux.8.gz
/usr/share/man/man8/blkmapd_selinux.8.gz
/usr/share/man/man8/blktap_selinux.8.gz
/usr/share/man/man8/blueman_selinux.8.gz
/usr/share/man/man8/bluetooth_helper_selinux.8.gz
/usr/share/man/man8/bluetooth_selinux.8.gz
/usr/share/man/man8/boinc_project_selinux.8.gz
/usr/share/man/man8/boinc_selinux.8.gz
/usr/share/man/man8/boltd_selinux.8.gz
/usr/share/man/man8/bootloader_selinux.8.gz
/usr/share/man/man8/brctl_selinux.8.gz
/usr/share/man/man8/brltty_selinux.8.gz
/usr/share/man/man8/bugzilla_script_selinux.8.gz
/usr/share/man/man8/bumblebee_selinux.8.gz
/usr/share/man/man8/cachefiles_kernel_selinux.8.gz
/usr/share/man/man8/cachefilesd_selinux.8.gz
/usr/share/man/man8/calamaris_selinux.8.gz
/usr/share/man/man8/callweaver_selinux.8.gz
/usr/share/man/man8/canna_selinux.8.gz
/usr/share/man/man8/cardmgr_selinux.8.gz
/usr/share/man/man8/ccs_selinux.8.gz
/usr/share/man/man8/cdcc_selinux.8.gz
/usr/share/man/man8/cdrecord_selinux.8.gz
/usr/share/man/man8/certmaster_selinux.8.gz
/usr/share/man/man8/certmonger_selinux.8.gz
/usr/share/man/man8/certmonger_unconfined_selinux.8.gz
/usr/share/man/man8/certwatch_selinux.8.gz
/usr/share/man/man8/cfengine_execd_selinux.8.gz
/usr/share/man/man8/cfengine_monitord_selinux.8.gz
/usr/share/man/man8/cfengine_serverd_selinux.8.gz
/usr/share/man/man8/cgclear_selinux.8.gz
/usr/share/man/man8/cgconfig_selinux.8.gz
/usr/share/man/man8/cgred_selinux.8.gz
/usr/share/man/man8/checkpc_selinux.8.gz
/usr/share/man/man8/checkpolicy_selinux.8.gz
/usr/share/man/man8/chfn_selinux.8.gz
/usr/share/man/man8/chkpwd_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_nacl_selinux.8.gz
/usr/share/man/man8/chrome_sandbox_selinux.8.gz
/usr/share/man/man8/chronyc_selinux.8.gz
/usr/share/man/man8/chronyd_selinux.8.gz
/usr/share/man/man8/chroot_user_selinux.8.gz
/usr/share/man/man8/cinder_api_selinux.8.gz
/usr/share/man/man8/cinder_backup_selinux.8.gz
/usr/share/man/man8/cinder_scheduler_selinux.8.gz
/usr/share/man/man8/cinder_volume_selinux.8.gz
/usr/share/man/man8/ciped_selinux.8.gz
/usr/share/man/man8/clamd_selinux.8.gz
/usr/share/man/man8/clamscan_selinux.8.gz
/usr/share/man/man8/clogd_selinux.8.gz
/usr/share/man/man8/cloud_init_selinux.8.gz
/usr/share/man/man8/cluster_selinux.8.gz
/usr/share/man/man8/clvmd_selinux.8.gz
/usr/share/man/man8/cmirrord_selinux.8.gz
/usr/share/man/man8/cobblerd_selinux.8.gz
/usr/share/man/man8/cockpit_session_selinux.8.gz
/usr/share/man/man8/cockpit_ws_selinux.8.gz
/usr/share/man/man8/collectd_script_selinux.8.gz
/usr/share/man/man8/collectd_selinux.8.gz
/usr/share/man/man8/colord_selinux.8.gz
/usr/share/man/man8/comsat_selinux.8.gz
/usr/share/man/man8/condor_collector_selinux.8.gz
/usr/share/man/man8/condor_master_selinux.8.gz
/usr/share/man/man8/condor_negotiator_selinux.8.gz
/usr/share/man/man8/condor_procd_selinux.8.gz
/usr/share/man/man8/condor_schedd_selinux.8.gz
/usr/share/man/man8/condor_startd_selinux.8.gz
/usr/share/man/man8/condor_startd_ssh_selinux.8.gz
/usr/share/man/man8/conman_selinux.8.gz
/usr/share/man/man8/conman_unconfined_script_selinux.8.gz
/usr/share/man/man8/conntrackd_selinux.8.gz
/usr/share/man/man8/consolekit_selinux.8.gz
/usr/share/man/man8/container_selinux.8.gz
/usr/share/man/man8/corosync_selinux.8.gz
/usr/share/man/man8/couchdb_selinux.8.gz
/usr/share/man/man8/courier_authdaemon_selinux.8.gz
/usr/share/man/man8/courier_pcp_selinux.8.gz
/usr/share/man/man8/courier_pop_selinux.8.gz
/usr/share/man/man8/courier_sqwebmail_selinux.8.gz
/usr/share/man/man8/courier_tcpd_selinux.8.gz
/usr/share/man/man8/cpucontrol_selinux.8.gz
/usr/share/man/man8/cpufreqselector_selinux.8.gz
/usr/share/man/man8/cpuplug_selinux.8.gz
/usr/share/man/man8/cpuspeed_selinux.8.gz
/usr/share/man/man8/crack_selinux.8.gz
/usr/share/man/man8/crond_selinux.8.gz
/usr/share/man/man8/cronjob_selinux.8.gz
/usr/share/man/man8/crontab_selinux.8.gz
/usr/share/man/man8/ctdbd_selinux.8.gz
/usr/share/man/man8/cups_brf_selinux.8.gz
/usr/share/man/man8/cups_pdf_selinux.8.gz
/usr/share/man/man8/cupsd_config_selinux.8.gz
/usr/share/man/man8/cupsd_lpd_selinux.8.gz
/usr/share/man/man8/cupsd_selinux.8.gz
/usr/share/man/man8/cvs_script_selinux.8.gz
/usr/share/man/man8/cvs_selinux.8.gz
/usr/share/man/man8/cyphesis_selinux.8.gz
/usr/share/man/man8/cyrus_selinux.8.gz
/usr/share/man/man8/dbadm_selinux.8.gz
/usr/share/man/man8/dbadm_sudo_selinux.8.gz
/usr/share/man/man8/dbskkd_selinux.8.gz
/usr/share/man/man8/dcc_client_selinux.8.gz
/usr/share/man/man8/dcc_dbclean_selinux.8.gz
/usr/share/man/man8/dccd_selinux.8.gz
/usr/share/man/man8/dccifd_selinux.8.gz
/usr/share/man/man8/dccm_selinux.8.gz
/usr/share/man/man8/dcerpcd_selinux.8.gz
/usr/share/man/man8/ddclient_selinux.8.gz
/usr/share/man/man8/deltacloudd_selinux.8.gz
/usr/share/man/man8/denyhosts_selinux.8.gz
/usr/share/man/man8/devicekit_disk_selinux.8.gz
/usr/share/man/man8/devicekit_power_selinux.8.gz
/usr/share/man/man8/devicekit_selinux.8.gz
/usr/share/man/man8/dhcpc_selinux.8.gz
/usr/share/man/man8/dhcpd_selinux.8.gz
/usr/share/man/man8/dictd_selinux.8.gz
/usr/share/man/man8/dirsrv_selinux.8.gz
/usr/share/man/man8/dirsrv_snmp_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_script_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_selinux.8.gz
/usr/share/man/man8/dirsrvadmin_unconfined_script_selinux.8.gz
/usr/share/man/man8/disk_munin_plugin_selinux.8.gz
/usr/share/man/man8/dkim_milter_selinux.8.gz
/usr/share/man/man8/dlm_controld_selinux.8.gz
/usr/share/man/man8/dmesg_selinux.8.gz
/usr/share/man/man8/dmidecode_selinux.8.gz
/usr/share/man/man8/dnsmasq_selinux.8.gz
/usr/share/man/man8/dnssec_trigger_selinux.8.gz
/usr/share/man/man8/dovecot_auth_selinux.8.gz
/usr/share/man/man8/dovecot_deliver_selinux.8.gz
/usr/share/man/man8/dovecot_selinux.8.gz
/usr/share/man/man8/drbd_selinux.8.gz
/usr/share/man/man8/dspam_script_selinux.8.gz
/usr/share/man/man8/dspam_selinux.8.gz
/usr/share/man/man8/entropyd_selinux.8.gz
/usr/share/man/man8/eventlogd_selinux.8.gz
/usr/share/man/man8/evtchnd_selinux.8.gz
/usr/share/man/man8/exim_selinux.8.gz
/usr/share/man/man8/fail2ban_client_selinux.8.gz
/usr/share/man/man8/fail2ban_selinux.8.gz
/usr/share/man/man8/fcoemon_selinux.8.gz
/usr/share/man/man8/fedoratp_selinux.8.gz
/usr/share/man/man8/fenced_selinux.8.gz
/usr/share/man/man8/fetchmail_selinux.8.gz
/usr/share/man/man8/fingerd_selinux.8.gz
/usr/share/man/man8/firewalld_selinux.8.gz
/usr/share/man/man8/firewallgui_selinux.8.gz
/usr/share/man/man8/firstboot_selinux.8.gz
/usr/share/man/man8/foghorn_selinux.8.gz
/usr/share/man/man8/fprintd_selinux.8.gz
/usr/share/man/man8/freeipmi_bmc_watchdog_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmidetectd_selinux.8.gz
/usr/share/man/man8/freeipmi_ipmiseld_selinux.8.gz
/usr/share/man/man8/freqset_selinux.8.gz
/usr/share/man/man8/freshclam_selinux.8.gz
/usr/share/man/man8/fsadm_selinux.8.gz
/usr/share/man/man8/fsdaemon_selinux.8.gz
/usr/share/man/man8/ftpd_selinux.8.gz
/usr/share/man/man8/ftpdctl_selinux.8.gz
/usr/share/man/man8/fwupd_selinux.8.gz
/usr/share/man/man8/games_selinux.8.gz
/usr/share/man/man8/games_srv_selinux.8.gz
/usr/share/man/man8/gconfd_selinux.8.gz
/usr/share/man/man8/gconfdefaultsm_selinux.8.gz
/usr/share/man/man8/gdomap_selinux.8.gz
/usr/share/man/man8/geoclue_selinux.8.gz
/usr/share/man/man8/getty_selinux.8.gz
/usr/share/man/man8/gfs_controld_selinux.8.gz
/usr/share/man/man8/git_script_selinux.8.gz
/usr/share/man/man8/git_session_selinux.8.gz
/usr/share/man/man8/git_system_selinux.8.gz
/usr/share/man/man8/gitosis_selinux.8.gz
/usr/share/man/man8/glance_api_selinux.8.gz
/usr/share/man/man8/glance_registry_selinux.8.gz
/usr/share/man/man8/glance_scrubber_selinux.8.gz
/usr/share/man/man8/glusterd_selinux.8.gz
/usr/share/man/man8/gnome_atspi_selinux.8.gz
/usr/share/man/man8/gnomesystemmm_selinux.8.gz
/usr/share/man/man8/gpg_agent_selinux.8.gz
/usr/share/man/man8/gpg_helper_selinux.8.gz
/usr/share/man/man8/gpg_pinentry_selinux.8.gz
/usr/share/man/man8/gpg_selinux.8.gz
/usr/share/man/man8/gpg_web_selinux.8.gz
/usr/share/man/man8/gpm_selinux.8.gz
/usr/share/man/man8/gpsd_selinux.8.gz
/usr/share/man/man8/greylist_milter_selinux.8.gz
/usr/share/man/man8/groupadd_selinux.8.gz
/usr/share/man/man8/groupd_selinux.8.gz
/usr/share/man/man8/gssd_selinux.8.gz
/usr/share/man/man8/gssproxy_selinux.8.gz
/usr/share/man/man8/guest_selinux.8.gz
/usr/share/man/man8/haproxy_selinux.8.gz
/usr/share/man/man8/hddtemp_selinux.8.gz
/usr/share/man/man8/hostapd_selinux.8.gz
/usr/share/man/man8/hostname_selinux.8.gz
/usr/share/man/man8/hsqldb_selinux.8.gz
/usr/share/man/man8/httpd_helper_selinux.8.gz
/usr/share/man/man8/httpd_passwd_selinux.8.gz
/usr/share/man/man8/httpd_php_selinux.8.gz
/usr/share/man/man8/httpd_rotatelogs_selinux.8.gz
/usr/share/man/man8/httpd_selinux.8.gz
/usr/share/man/man8/httpd_suexec_selinux.8.gz
/usr/share/man/man8/httpd_sys_script_selinux.8.gz
/usr/share/man/man8/httpd_unconfined_script_selinux.8.gz
/usr/share/man/man8/httpd_user_script_selinux.8.gz
/usr/share/man/man8/hwclock_selinux.8.gz
/usr/share/man/man8/hwloc_dhwd_selinux.8.gz
/usr/share/man/man8/hypervkvp_selinux.8.gz
/usr/share/man/man8/hypervvssd_selinux.8.gz
/usr/share/man/man8/ibacm_selinux.8.gz
/usr/share/man/man8/iceauth_selinux.8.gz
/usr/share/man/man8/icecast_selinux.8.gz
/usr/share/man/man8/ifconfig_selinux.8.gz
/usr/share/man/man8/inetd_child_selinux.8.gz
/usr/share/man/man8/inetd_selinux.8.gz
/usr/share/man/man8/init_selinux.8.gz
/usr/share/man/man8/initrc_selinux.8.gz
/usr/share/man/man8/innd_selinux.8.gz
/usr/share/man/man8/insights_client_selinux.8.gz
/usr/share/man/man8/install_selinux.8.gz
/usr/share/man/man8/iodined_selinux.8.gz
/usr/share/man/man8/iotop_selinux.8.gz
/usr/share/man/man8/ipa_custodia_selinux.8.gz
/usr/share/man/man8/ipa_dnskey_selinux.8.gz
/usr/share/man/man8/ipa_helper_selinux.8.gz
/usr/share/man/man8/ipa_ods_exporter_selinux.8.gz
/usr/share/man/man8/ipa_otpd_selinux.8.gz
/usr/share/man/man8/ipmievd_helper_selinux.8.gz
/usr/share/man/man8/ipmievd_selinux.8.gz
/usr/share/man/man8/ipsec_mgmt_selinux.8.gz
/usr/share/man/man8/ipsec_selinux.8.gz
/usr/share/man/man8/iptables_selinux.8.gz
/usr/share/man/man8/irc_selinux.8.gz
/usr/share/man/man8/irqbalance_selinux.8.gz
/usr/share/man/man8/irssi_selinux.8.gz
/usr/share/man/man8/iscsid_selinux.8.gz
/usr/share/man/man8/isnsd_selinux.8.gz
/usr/share/man/man8/iwhd_selinux.8.gz
/usr/share/man/man8/jabberd_router_selinux.8.gz
/usr/share/man/man8/jabberd_selinux.8.gz
/usr/share/man/man8/jetty_selinux.8.gz
/usr/share/man/man8/jockey_selinux.8.gz
/usr/share/man/man8/journalctl_selinux.8.gz
/usr/share/man/man8/kadmind_selinux.8.gz
/usr/share/man/man8/kdump_selinux.8.gz
/usr/share/man/man8/kdumpctl_selinux.8.gz
/usr/share/man/man8/kdumpgui_selinux.8.gz
/usr/share/man/man8/keepalived_selinux.8.gz
/usr/share/man/man8/keepalived_unconfined_script_selinux.8.gz
/usr/share/man/man8/kernel_selinux.8.gz
/usr/share/man/man8/keyboardd_selinux.8.gz
/usr/share/man/man8/keystone_cgi_script_selinux.8.gz
/usr/share/man/man8/keystone_selinux.8.gz
/usr/share/man/man8/kismet_selinux.8.gz
/usr/share/man/man8/klogd_selinux.8.gz
/usr/share/man/man8/kmod_selinux.8.gz
/usr/share/man/man8/kmscon_selinux.8.gz
/usr/share/man/man8/kpatch_selinux.8.gz
/usr/share/man/man8/kpropd_selinux.8.gz
/usr/share/man/man8/krb5kdc_selinux.8.gz
/usr/share/man/man8/ksm_selinux.8.gz
/usr/share/man/man8/ksmtuned_selinux.8.gz
/usr/share/man/man8/ktalkd_selinux.8.gz
/usr/share/man/man8/l2tpd_selinux.8.gz
/usr/share/man/man8/ldconfig_selinux.8.gz
/usr/share/man/man8/libvirt_selinux.8.gz
/usr/share/man/man8/lircd_selinux.8.gz
/usr/share/man/man8/livecd_selinux.8.gz
/usr/share/man/man8/lldpad_selinux.8.gz
/usr/share/man/man8/load_policy_selinux.8.gz
/usr/share/man/man8/loadkeys_selinux.8.gz
/usr/share/man/man8/local_login_selinux.8.gz
/usr/share/man/man8/locate_selinux.8.gz
/usr/share/man/man8/lockdev_selinux.8.gz
/usr/share/man/man8/logadm_selinux.8.gz
/usr/share/man/man8/logrotate_mail_selinux.8.gz
/usr/share/man/man8/logrotate_selinux.8.gz
/usr/share/man/man8/logwatch_mail_selinux.8.gz
/usr/share/man/man8/logwatch_selinux.8.gz
/usr/share/man/man8/lpd_selinux.8.gz
/usr/share/man/man8/lpr_selinux.8.gz
/usr/share/man/man8/lsassd_selinux.8.gz
/usr/share/man/man8/lsmd_plugin_selinux.8.gz
/usr/share/man/man8/lsmd_selinux.8.gz
/usr/share/man/man8/lttng_sessiond_selinux.8.gz
/usr/share/man/man8/lvm_selinux.8.gz
/usr/share/man/man8/lwiod_selinux.8.gz
/usr/share/man/man8/lwregd_selinux.8.gz
/usr/share/man/man8/lwsmd_selinux.8.gz
/usr/share/man/man8/mail_munin_plugin_selinux.8.gz
/usr/share/man/man8/mailman_cgi_selinux.8.gz
/usr/share/man/man8/mailman_mail_selinux.8.gz
/usr/share/man/man8/mailman_queue_selinux.8.gz
/usr/share/man/man8/man2html_script_selinux.8.gz
/usr/share/man/man8/mandb_selinux.8.gz
/usr/share/man/man8/mcelog_selinux.8.gz
/usr/share/man/man8/mdadm_selinux.8.gz
/usr/share/man/man8/mediawiki_script_selinux.8.gz
/usr/share/man/man8/memcached_selinux.8.gz
/usr/share/man/man8/mencoder_selinux.8.gz
/usr/share/man/man8/minidlna_selinux.8.gz
/usr/share/man/man8/minissdpd_selinux.8.gz
/usr/share/man/man8/mip6d_selinux.8.gz
/usr/share/man/man8/mirrormanager_selinux.8.gz
/usr/share/man/man8/mock_build_selinux.8.gz
/usr/share/man/man8/mock_selinux.8.gz
/usr/share/man/man8/modemmanager_selinux.8.gz
/usr/share/man/man8/mojomojo_script_selinux.8.gz
/usr/share/man/man8/mon_procd_selinux.8.gz
/usr/share/man/man8/mon_statd_selinux.8.gz
/usr/share/man/man8/mongod_selinux.8.gz
/usr/share/man/man8/motion_selinux.8.gz
/usr/share/man/man8/mount_ecryptfs_selinux.8.gz
/usr/share/man/man8/mount_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_config_selinux.8.gz
/usr/share/man/man8/mozilla_plugin_selinux.8.gz
/usr/share/man/man8/mozilla_selinux.8.gz
/usr/share/man/man8/mpd_selinux.8.gz
/usr/share/man/man8/mplayer_selinux.8.gz
/usr/share/man/man8/mrtg_selinux.8.gz
/usr/share/man/man8/mscan_selinux.8.gz
/usr/share/man/man8/munin_script_selinux.8.gz
/usr/share/man/man8/munin_selinux.8.gz
/usr/share/man/man8/mysqld_safe_selinux.8.gz
/usr/share/man/man8/mysqld_selinux.8.gz
/usr/share/man/man8/mysqlmanagerd_selinux.8.gz
/usr/share/man/man8/mythtv_script_selinux.8.gz
/usr/share/man/man8/naemon_selinux.8.gz
/usr/share/man/man8/nagios_admin_plugin_selinux.8.gz
/usr/share/man/man8/nagios_checkdisk_plugin_selinux.8.gz
/usr/share/man/man8/nagios_eventhandler_plugin_selinux.8.gz
/usr/share/man/man8/nagios_mail_plugin_selinux.8.gz
/usr/share/man/man8/nagios_openshift_plugin_selinux.8.gz
/usr/share/man/man8/nagios_script_selinux.8.gz
/usr/share/man/man8/nagios_selinux.8.gz
/usr/share/man/man8/nagios_services_plugin_selinux.8.gz
/usr/share/man/man8/nagios_system_plugin_selinux.8.gz
/usr/share/man/man8/nagios_unconfined_plugin_selinux.8.gz
/usr/share/man/man8/named_selinux.8.gz
/usr/share/man/man8/namespace_init_selinux.8.gz
/usr/share/man/man8/ncftool_selinux.8.gz
/usr/share/man/man8/ndc_selinux.8.gz
/usr/share/man/man8/netlabel_mgmt_selinux.8.gz
/usr/share/man/man8/netlogond_selinux.8.gz
/usr/share/man/man8/netutils_selinux.8.gz
/usr/share/man/man8/neutron_selinux.8.gz
/usr/share/man/man8/newrole_selinux.8.gz
/usr/share/man/man8/nfsd_selinux.8.gz
/usr/share/man/man8/ninfod_selinux.8.gz
/usr/share/man/man8/nmbd_selinux.8.gz
/usr/share/man/man8/nova_selinux.8.gz
/usr/share/man/man8/nrpe_selinux.8.gz
/usr/share/man/man8/nscd_selinux.8.gz
/usr/share/man/man8/nsd_crond_selinux.8.gz
/usr/share/man/man8/nsd_selinux.8.gz
/usr/share/man/man8/nslcd_selinux.8.gz
/usr/share/man/man8/ntop_selinux.8.gz
/usr/share/man/man8/ntpd_selinux.8.gz
/usr/share/man/man8/numad_selinux.8.gz
/usr/share/man/man8/nut_upsd_selinux.8.gz
/usr/share/man/man8/nut_upsdrvctl_selinux.8.gz
/usr/share/man/man8/nut_upsmon_selinux.8.gz
/usr/share/man/man8/nutups_cgi_script_selinux.8.gz
/usr/share/man/man8/nx_server_selinux.8.gz
/usr/share/man/man8/nx_server_ssh_selinux.8.gz
/usr/share/man/man8/obex_selinux.8.gz
/usr/share/man/man8/oddjob_mkhomedir_selinux.8.gz
/usr/share/man/man8/oddjob_selinux.8.gz
/usr/share/man/man8/opafm_selinux.8.gz
/usr/share/man/man8/openct_selinux.8.gz
/usr/share/man/man8/opendnssec_selinux.8.gz
/usr/share/man/man8/openfortivpn_selinux.8.gz
/usr/share/man/man8/openhpid_selinux.8.gz
/usr/share/man/man8/openshift_app_selinux.8.gz
/usr/share/man/man8/openshift_cgroup_read_selinux.8.gz
/usr/share/man/man8/openshift_cron_selinux.8.gz
/usr/share/man/man8/openshift_initrc_selinux.8.gz
/usr/share/man/man8/openshift_net_read_selinux.8.gz
/usr/share/man/man8/openshift_script_selinux.8.gz
/usr/share/man/man8/openshift_selinux.8.gz
/usr/share/man/man8/opensm_selinux.8.gz
/usr/share/man/man8/openvpn_selinux.8.gz
/usr/share/man/man8/openvpn_unconfined_script_selinux.8.gz
/usr/share/man/man8/openvswitch_selinux.8.gz
/usr/share/man/man8/openwsman_selinux.8.gz
/usr/share/man/man8/oracleasm_selinux.8.gz
/usr/share/man/man8/osad_selinux.8.gz
/usr/share/man/man8/pacemaker_selinux.8.gz
/usr/share/man/man8/pads_selinux.8.gz
/usr/share/man/man8/pam_console_selinux.8.gz
/usr/share/man/man8/pam_timestamp_selinux.8.gz
/usr/share/man/man8/passenger_selinux.8.gz
/usr/share/man/man8/passwd_selinux.8.gz
/usr/share/man/man8/pcp_plugin_selinux.8.gz
/usr/share/man/man8/pcp_pmcd_selinux.8.gz
/usr/share/man/man8/pcp_pmie_selinux.8.gz
/usr/share/man/man8/pcp_pmlogger_selinux.8.gz
/usr/share/man/man8/pcp_pmproxy_selinux.8.gz
/usr/share/man/man8/pcscd_selinux.8.gz
/usr/share/man/man8/pdns_control_selinux.8.gz
/usr/share/man/man8/pdns_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_account_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_admin_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_logicalfile_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_services_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_storage_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_system_selinux.8.gz
/usr/share/man/man8/pegasus_openlmi_unconfined_selinux.8.gz
/usr/share/man/man8/pegasus_selinux.8.gz
/usr/share/man/man8/pesign_selinux.8.gz
/usr/share/man/man8/phc2sys_selinux.8.gz
/usr/share/man/man8/ping_selinux.8.gz
/usr/share/man/man8/pingd_selinux.8.gz
/usr/share/man/man8/piranha_fos_selinux.8.gz
/usr/share/man/man8/piranha_lvs_selinux.8.gz
/usr/share/man/man8/piranha_pulse_selinux.8.gz
/usr/share/man/man8/piranha_web_selinux.8.gz
/usr/share/man/man8/pkcs11proxyd_selinux.8.gz
/usr/share/man/man8/pkcs_slotd_selinux.8.gz
/usr/share/man/man8/pki_ra_selinux.8.gz
/usr/share/man/man8/pki_tomcat_script_selinux.8.gz
/usr/share/man/man8/pki_tomcat_selinux.8.gz
/usr/share/man/man8/pki_tps_selinux.8.gz
/usr/share/man/man8/plymouth_selinux.8.gz
/usr/share/man/man8/plymouthd_selinux.8.gz
/usr/share/man/man8/podsleuth_selinux.8.gz
/usr/share/man/man8/policykit_auth_selinux.8.gz
/usr/share/man/man8/policykit_grant_selinux.8.gz
/usr/share/man/man8/policykit_resolve_selinux.8.gz
/usr/share/man/man8/policykit_selinux.8.gz
/usr/share/man/man8/polipo_selinux.8.gz
/usr/share/man/man8/polipo_session_selinux.8.gz
/usr/share/man/man8/portmap_helper_selinux.8.gz
/usr/share/man/man8/portmap_selinux.8.gz
/usr/share/man/man8/portreserve_selinux.8.gz
/usr/share/man/man8/postfix_bounce_selinux.8.gz
/usr/share/man/man8/postfix_cleanup_selinux.8.gz
/usr/share/man/man8/postfix_local_selinux.8.gz
/usr/share/man/man8/postfix_map_selinux.8.gz
/usr/share/man/man8/postfix_master_selinux.8.gz
/usr/share/man/man8/postfix_pickup_selinux.8.gz
/usr/share/man/man8/postfix_pipe_selinux.8.gz
/usr/share/man/man8/postfix_postdrop_selinux.8.gz
/usr/share/man/man8/postfix_postqueue_selinux.8.gz
/usr/share/man/man8/postfix_qmgr_selinux.8.gz
/usr/share/man/man8/postfix_showq_selinux.8.gz
/usr/share/man/man8/postfix_smtp_selinux.8.gz
/usr/share/man/man8/postfix_smtpd_selinux.8.gz
/usr/share/man/man8/postfix_virtual_selinux.8.gz
/usr/share/man/man8/postgresql_selinux.8.gz
/usr/share/man/man8/postgrey_selinux.8.gz
/usr/share/man/man8/pppd_selinux.8.gz
/usr/share/man/man8/pptp_selinux.8.gz
/usr/share/man/man8/prelink_cron_system_selinux.8.gz
/usr/share/man/man8/prelink_selinux.8.gz
/usr/share/man/man8/prelude_audisp_selinux.8.gz
/usr/share/man/man8/prelude_correlator_selinux.8.gz
/usr/share/man/man8/prelude_lml_selinux.8.gz
/usr/share/man/man8/prelude_selinux.8.gz
/usr/share/man/man8/preupgrade_selinux.8.gz
/usr/share/man/man8/prewikka_script_selinux.8.gz
/usr/share/man/man8/privoxy_selinux.8.gz
/usr/share/man/man8/procmail_selinux.8.gz
/usr/share/man/man8/prosody_selinux.8.gz
/usr/share/man/man8/psad_selinux.8.gz
/usr/share/man/man8/ptal_selinux.8.gz
/usr/share/man/man8/ptchown_selinux.8.gz
/usr/share/man/man8/ptp4l_selinux.8.gz
/usr/share/man/man8/publicfile_selinux.8.gz
/usr/share/man/man8/pulseaudio_selinux.8.gz
/usr/share/man/man8/puppetagent_selinux.8.gz
/usr/share/man/man8/puppetca_selinux.8.gz
/usr/share/man/man8/puppetmaster_selinux.8.gz
/usr/share/man/man8/pwauth_selinux.8.gz
/usr/share/man/man8/pyicqt_selinux.8.gz
/usr/share/man/man8/qdiskd_selinux.8.gz
/usr/share/man/man8/qemu_dm_selinux.8.gz
/usr/share/man/man8/qmail_clean_selinux.8.gz
/usr/share/man/man8/qmail_inject_selinux.8.gz
/usr/share/man/man8/qmail_local_selinux.8.gz
/usr/share/man/man8/qmail_lspawn_selinux.8.gz
/usr/share/man/man8/qmail_queue_selinux.8.gz
/usr/share/man/man8/qmail_remote_selinux.8.gz
/usr/share/man/man8/qmail_rspawn_selinux.8.gz
/usr/share/man/man8/qmail_send_selinux.8.gz
/usr/share/man/man8/qmail_smtpd_selinux.8.gz
/usr/share/man/man8/qmail_splogger_selinux.8.gz
/usr/share/man/man8/qmail_start_selinux.8.gz
/usr/share/man/man8/qmail_tcp_env_selinux.8.gz
/usr/share/man/man8/qpidd_selinux.8.gz
/usr/share/man/man8/quota_nld_selinux.8.gz
/usr/share/man/man8/quota_selinux.8.gz
/usr/share/man/man8/rabbitmq_selinux.8.gz
/usr/share/man/man8/racoon_selinux.8.gz
/usr/share/man/man8/radiusd_selinux.8.gz
/usr/share/man/man8/radvd_selinux.8.gz
/usr/share/man/man8/raid_selinux.8.gz
/usr/share/man/man8/rasdaemon_selinux.8.gz
/usr/share/man/man8/rdisc_selinux.8.gz
/usr/share/man/man8/readahead_selinux.8.gz
/usr/share/man/man8/realmd_consolehelper_selinux.8.gz
/usr/share/man/man8/realmd_selinux.8.gz
/usr/share/man/man8/redis_selinux.8.gz
/usr/share/man/man8/regex_milter_selinux.8.gz
/usr/share/man/man8/remote_login_selinux.8.gz
/usr/share/man/man8/restorecond_selinux.8.gz
/usr/share/man/man8/rgmanager_selinux.8.gz
/usr/share/man/man8/rhcd_selinux.8.gz
/usr/share/man/man8/rhev_agentd_consolehelper_selinux.8.gz
/usr/share/man/man8/rhev_agentd_selinux.8.gz
/usr/share/man/man8/rhgb_selinux.8.gz
/usr/share/man/man8/rhnsd_selinux.8.gz
/usr/share/man/man8/rhsmcertd_selinux.8.gz
/usr/share/man/man8/ricci_modcluster_selinux.8.gz
/usr/share/man/man8/ricci_modclusterd_selinux.8.gz
/usr/share/man/man8/ricci_modlog_selinux.8.gz
/usr/share/man/man8/ricci_modrpm_selinux.8.gz
/usr/share/man/man8/ricci_modservice_selinux.8.gz
/usr/share/man/man8/ricci_modstorage_selinux.8.gz
/usr/share/man/man8/ricci_selinux.8.gz
/usr/share/man/man8/rkt_selinux.8.gz
/usr/share/man/man8/rlogind_selinux.8.gz
/usr/share/man/man8/rngd_selinux.8.gz
/usr/share/man/man8/rolekit_selinux.8.gz
/usr/share/man/man8/roundup_selinux.8.gz
/usr/share/man/man8/rpcbind_selinux.8.gz
/usr/share/man/man8/rpcd_selinux.8.gz
/usr/share/man/man8/rpm_script_selinux.8.gz
/usr/share/man/man8/rpm_selinux.8.gz
/usr/share/man/man8/rpmdb_selinux.8.gz
/usr/share/man/man8/rrdcached_selinux.8.gz
/usr/share/man/man8/rshd_selinux.8.gz
/usr/share/man/man8/rssh_chroot_helper_selinux.8.gz
/usr/share/man/man8/rssh_selinux.8.gz
/usr/share/man/man8/rsync_selinux.8.gz
/usr/share/man/man8/rtas_errd_selinux.8.gz
/usr/share/man/man8/rtkit_daemon_selinux.8.gz
/usr/share/man/man8/run_init_selinux.8.gz
/usr/share/man/man8/rwho_selinux.8.gz
/usr/share/man/man8/samba_net_selinux.8.gz
/usr/share/man/man8/samba_selinux.8.gz
/usr/share/man/man8/samba_unconfined_net_selinux.8.gz
/usr/share/man/man8/samba_unconfined_script_selinux.8.gz
/usr/share/man/man8/sambagui_selinux.8.gz
/usr/share/man/man8/sandbox_min_client_selinux.8.gz
/usr/share/man/man8/sandbox_min_selinux.8.gz
/usr/share/man/man8/sandbox_net_client_selinux.8.gz
/usr/share/man/man8/sandbox_net_selinux.8.gz
/usr/share/man/man8/sandbox_selinux.8.gz
/usr/share/man/man8/sandbox_web_client_selinux.8.gz
/usr/share/man/man8/sandbox_web_selinux.8.gz
/usr/share/man/man8/sandbox_x_client_selinux.8.gz
/usr/share/man/man8/sandbox_x_selinux.8.gz
/usr/share/man/man8/sandbox_xserver_selinux.8.gz
/usr/share/man/man8/sanlk_resetd_selinux.8.gz
/usr/share/man/man8/sanlock_selinux.8.gz
/usr/share/man/man8/saslauthd_selinux.8.gz
/usr/share/man/man8/sbd_selinux.8.gz
/usr/share/man/man8/sblim_gatherd_selinux.8.gz
/usr/share/man/man8/sblim_reposd_selinux.8.gz
/usr/share/man/man8/sblim_sfcbd_selinux.8.gz
/usr/share/man/man8/secadm_screen_selinux.8.gz
/usr/share/man/man8/secadm_selinux.8.gz
/usr/share/man/man8/secadm_su_selinux.8.gz
/usr/share/man/man8/secadm_sudo_selinux.8.gz
/usr/share/man/man8/sectoolm_selinux.8.gz
/usr/share/man/man8/selinux_munin_plugin_selinux.8.gz
/usr/share/man/man8/semanage_selinux.8.gz
/usr/share/man/man8/sendmail_selinux.8.gz
/usr/share/man/man8/sensord_selinux.8.gz
/usr/share/man/man8/sepgsql_ranged_proc_selinux.8.gz
/usr/share/man/man8/sepgsql_trusted_proc_selinux.8.gz
/usr/share/man/man8/services_munin_plugin_selinux.8.gz
/usr/share/man/man8/setfiles_mac_selinux.8.gz
/usr/share/man/man8/setfiles_selinux.8.gz
/usr/share/man/man8/setkey_selinux.8.gz
/usr/share/man/man8/setrans_selinux.8.gz
/usr/share/man/man8/setroubleshoot_fixit_selinux.8.gz
/usr/share/man/man8/setroubleshootd_selinux.8.gz
/usr/share/man/man8/setsebool_selinux.8.gz
/usr/share/man/man8/sftpd_selinux.8.gz
/usr/share/man/man8/sge_execd_selinux.8.gz
/usr/share/man/man8/sge_job_selinux.8.gz
/usr/share/man/man8/sge_job_ssh_selinux.8.gz
/usr/share/man/man8/sge_shepherd_selinux.8.gz
/usr/share/man/man8/shorewall_selinux.8.gz
/usr/share/man/man8/showmount_selinux.8.gz
/usr/share/man/man8/slapd_selinux.8.gz
/usr/share/man/man8/slpd_selinux.8.gz
/usr/share/man/man8/smartmon_selinux.8.gz
/usr/share/man/man8/smbcontrol_selinux.8.gz
/usr/share/man/man8/smbd_selinux.8.gz
/usr/share/man/man8/smbmount_selinux.8.gz
/usr/share/man/man8/smokeping_cgi_script_selinux.8.gz
/usr/share/man/man8/smokeping_selinux.8.gz
/usr/share/man/man8/smoltclient_selinux.8.gz
/usr/share/man/man8/smsd_selinux.8.gz
/usr/share/man/man8/snapperd_selinux.8.gz
/usr/share/man/man8/snmpd_selinux.8.gz
/usr/share/man/man8/snort_selinux.8.gz
/usr/share/man/man8/sosreport_selinux.8.gz
/usr/share/man/man8/soundd_selinux.8.gz
/usr/share/man/man8/spamass_milter_selinux.8.gz
/usr/share/man/man8/spamc_selinux.8.gz
/usr/share/man/man8/spamd_selinux.8.gz
/usr/share/man/man8/spamd_update_selinux.8.gz
/usr/share/man/man8/speech_dispatcher_selinux.8.gz
/usr/share/man/man8/squid_cron_selinux.8.gz
/usr/share/man/man8/squid_script_selinux.8.gz
/usr/share/man/man8/squid_selinux.8.gz
/usr/share/man/man8/srvsvcd_selinux.8.gz
/usr/share/man/man8/ssh_keygen_selinux.8.gz
/usr/share/man/man8/ssh_keysign_selinux.8.gz
/usr/share/man/man8/ssh_selinux.8.gz
/usr/share/man/man8/sshd_keygen_selinux.8.gz
/usr/share/man/man8/sshd_net_selinux.8.gz
/usr/share/man/man8/sshd_sandbox_selinux.8.gz
/usr/share/man/man8/sshd_selinux.8.gz
/usr/share/man/man8/sslh_selinux.8.gz
/usr/share/man/man8/sssd_selinux.8.gz
/usr/share/man/man8/sssd_selinux_manager_selinux.8.gz
/usr/share/man/man8/staff_consolehelper_selinux.8.gz
/usr/share/man/man8/staff_dbusd_selinux.8.gz
/usr/share/man/man8/staff_gkeyringd_selinux.8.gz
/usr/share/man/man8/staff_screen_selinux.8.gz
/usr/share/man/man8/staff_selinux.8.gz
/usr/share/man/man8/staff_seunshare_selinux.8.gz
/usr/share/man/man8/staff_ssh_agent_selinux.8.gz
/usr/share/man/man8/staff_sudo_selinux.8.gz
/usr/share/man/man8/staff_wine_selinux.8.gz
/usr/share/man/man8/stalld_selinux.8.gz
/usr/share/man/man8/stapserver_selinux.8.gz
/usr/share/man/man8/stratisd_selinux.8.gz
/usr/share/man/man8/stunnel_selinux.8.gz
/usr/share/man/man8/sulogin_selinux.8.gz
/usr/share/man/man8/svc_multilog_selinux.8.gz
/usr/share/man/man8/svc_run_selinux.8.gz
/usr/share/man/man8/svc_start_selinux.8.gz
/usr/share/man/man8/svirt_kvm_net_selinux.8.gz
/usr/share/man/man8/svirt_qemu_net_selinux.8.gz
/usr/share/man/man8/svirt_selinux.8.gz
/usr/share/man/man8/svirt_socket_selinux.8.gz
/usr/share/man/man8/svirt_tcg_selinux.8.gz
/usr/share/man/man8/svnserve_selinux.8.gz
/usr/share/man/man8/swat_selinux.8.gz
/usr/share/man/man8/swift_selinux.8.gz
/usr/share/man/man8/sysadm_dbusd_selinux.8.gz
/usr/share/man/man8/sysadm_gkeyringd_selinux.8.gz
/usr/share/man/man8/sysadm_passwd_selinux.8.gz
/usr/share/man/man8/sysadm_screen_selinux.8.gz
/usr/share/man/man8/sysadm_selinux.8.gz
/usr/share/man/man8/sysadm_seunshare_selinux.8.gz
/usr/share/man/man8/sysadm_ssh_agent_selinux.8.gz
/usr/share/man/man8/sysadm_su_selinux.8.gz
/usr/share/man/man8/sysadm_sudo_selinux.8.gz
/usr/share/man/man8/syslogd_selinux.8.gz
/usr/share/man/man8/sysstat_selinux.8.gz
/usr/share/man/man8/system_cronjob_selinux.8.gz
/usr/share/man/man8/system_dbusd_selinux.8.gz
/usr/share/man/man8/system_mail_selinux.8.gz
/usr/share/man/man8/system_munin_plugin_selinux.8.gz
/usr/share/man/man8/systemd_bootchart_selinux.8.gz
/usr/share/man/man8/systemd_coredump_selinux.8.gz
/usr/share/man/man8/systemd_gpt_generator_selinux.8.gz
/usr/share/man/man8/systemd_hostnamed_selinux.8.gz
/usr/share/man/man8/systemd_hwdb_selinux.8.gz
/usr/share/man/man8/systemd_importd_selinux.8.gz
/usr/share/man/man8/systemd_initctl_selinux.8.gz
/usr/share/man/man8/systemd_journal_upload_selinux.8.gz
/usr/share/man/man8/systemd_localed_selinux.8.gz
/usr/share/man/man8/systemd_logger_selinux.8.gz
/usr/share/man/man8/systemd_logind_selinux.8.gz
/usr/share/man/man8/systemd_machined_selinux.8.gz
/usr/share/man/man8/systemd_modules_load_selinux.8.gz
/usr/share/man/man8/systemd_network_generator_selinux.8.gz
/usr/share/man/man8/systemd_networkd_selinux.8.gz
/usr/share/man/man8/systemd_notify_selinux.8.gz
/usr/share/man/man8/systemd_passwd_agent_selinux.8.gz
/usr/share/man/man8/systemd_resolved_selinux.8.gz
/usr/share/man/man8/systemd_rfkill_selinux.8.gz
/usr/share/man/man8/systemd_sleep_selinux.8.gz
/usr/share/man/man8/systemd_socket_proxyd_selinux.8.gz
/usr/share/man/man8/systemd_sysctl_selinux.8.gz
/usr/share/man/man8/systemd_timedated_selinux.8.gz
/usr/share/man/man8/systemd_tmpfiles_selinux.8.gz
/usr/share/man/man8/systemd_userdbd_selinux.8.gz
/usr/share/man/man8/tangd_selinux.8.gz
/usr/share/man/man8/targetclid_selinux.8.gz
/usr/share/man/man8/targetd_selinux.8.gz
/usr/share/man/man8/tcpd_selinux.8.gz
/usr/share/man/man8/tcsd_selinux.8.gz
/usr/share/man/man8/telepathy_gabble_selinux.8.gz
/usr/share/man/man8/telepathy_idle_selinux.8.gz
/usr/share/man/man8/telepathy_logger_selinux.8.gz
/usr/share/man/man8/telepathy_mission_control_selinux.8.gz
/usr/share/man/man8/telepathy_msn_selinux.8.gz
/usr/share/man/man8/telepathy_salut_selinux.8.gz
/usr/share/man/man8/telepathy_sofiasip_selinux.8.gz
/usr/share/man/man8/telepathy_stream_engine_selinux.8.gz
/usr/share/man/man8/telepathy_sunshine_selinux.8.gz
/usr/share/man/man8/telnetd_selinux.8.gz
/usr/share/man/man8/tftpd_selinux.8.gz
/usr/share/man/man8/tgtd_selinux.8.gz
/usr/share/man/man8/thin_aeolus_configserver_selinux.8.gz
/usr/share/man/man8/thin_selinux.8.gz
/usr/share/man/man8/thumb_selinux.8.gz
/usr/share/man/man8/timedatex_selinux.8.gz
/usr/share/man/man8/timemaster_selinux.8.gz
/usr/share/man/man8/tlp_selinux.8.gz
/usr/share/man/man8/tmpreaper_selinux.8.gz
/usr/share/man/man8/tomcat_selinux.8.gz
/usr/share/man/man8/tor_selinux.8.gz
/usr/share/man/man8/traceroute_selinux.8.gz
/usr/share/man/man8/tuned_selinux.8.gz
/usr/share/man/man8/tvtime_selinux.8.gz
/usr/share/man/man8/udev_selinux.8.gz
/usr/share/man/man8/ulogd_selinux.8.gz
/usr/share/man/man8/uml_selinux.8.gz
/usr/share/man/man8/uml_switch_selinux.8.gz
/usr/share/man/man8/unconfined_cronjob_selinux.8.gz
/usr/share/man/man8/unconfined_dbusd_selinux.8.gz
/usr/share/man/man8/unconfined_mount_selinux.8.gz
/usr/share/man/man8/unconfined_munin_plugin_selinux.8.gz
/usr/share/man/man8/unconfined_selinux.8.gz
/usr/share/man/man8/unconfined_sendmail_selinux.8.gz
/usr/share/man/man8/unconfined_service_selinux.8.gz
/usr/share/man/man8/updfstab_selinux.8.gz
/usr/share/man/man8/updpwd_selinux.8.gz
/usr/share/man/man8/usbmodules_selinux.8.gz
/usr/share/man/man8/usbmuxd_selinux.8.gz
/usr/share/man/man8/user_dbusd_selinux.8.gz
/usr/share/man/man8/user_gkeyringd_selinux.8.gz
/usr/share/man/man8/user_mail_selinux.8.gz
/usr/share/man/man8/user_screen_selinux.8.gz
/usr/share/man/man8/user_selinux.8.gz
/usr/share/man/man8/user_seunshare_selinux.8.gz
/usr/share/man/man8/user_ssh_agent_selinux.8.gz
/usr/share/man/man8/user_wine_selinux.8.gz
/usr/share/man/man8/useradd_selinux.8.gz
/usr/share/man/man8/usernetctl_selinux.8.gz
/usr/share/man/man8/utempter_selinux.8.gz
/usr/share/man/man8/uucpd_selinux.8.gz
/usr/share/man/man8/uuidd_selinux.8.gz
/usr/share/man/man8/uux_selinux.8.gz
/usr/share/man/man8/varnishd_selinux.8.gz
/usr/share/man/man8/varnishlog_selinux.8.gz
/usr/share/man/man8/vdagent_selinux.8.gz
/usr/share/man/man8/vhostmd_selinux.8.gz
/usr/share/man/man8/virsh_selinux.8.gz
/usr/share/man/man8/virsh_ssh_selinux.8.gz
/usr/share/man/man8/virt_bridgehelper_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_selinux.8.gz
/usr/share/man/man8/virt_qemu_ga_unconfined_selinux.8.gz
/usr/share/man/man8/virt_selinux.8.gz
/usr/share/man/man8/virtd_lxc_selinux.8.gz
/usr/share/man/man8/virtd_selinux.8.gz
/usr/share/man/man8/virtlogd_selinux.8.gz
/usr/share/man/man8/vlock_selinux.8.gz
/usr/share/man/man8/vmtools_helper_selinux.8.gz
/usr/share/man/man8/vmtools_selinux.8.gz
/usr/share/man/man8/vmtools_unconfined_selinux.8.gz
/usr/share/man/man8/vmware_host_selinux.8.gz
/usr/share/man/man8/vmware_selinux.8.gz
/usr/share/man/man8/vnstat_selinux.8.gz
/usr/share/man/man8/vnstatd_selinux.8.gz
/usr/share/man/man8/vpnc_selinux.8.gz
/usr/share/man/man8/w3c_validator_script_selinux.8.gz
/usr/share/man/man8/watchdog_selinux.8.gz
/usr/share/man/man8/watchdog_unconfined_selinux.8.gz
/usr/share/man/man8/wdmd_selinux.8.gz
/usr/share/man/man8/webadm_selinux.8.gz
/usr/share/man/man8/webalizer_script_selinux.8.gz
/usr/share/man/man8/webalizer_selinux.8.gz
/usr/share/man/man8/winbind_helper_selinux.8.gz
/usr/share/man/man8/winbind_rpcd_selinux.8.gz
/usr/share/man/man8/winbind_selinux.8.gz
/usr/share/man/man8/wine_selinux.8.gz
/usr/share/man/man8/wireshark_selinux.8.gz
/usr/share/man/man8/wpa_cli_selinux.8.gz
/usr/share/man/man8/xauth_selinux.8.gz
/usr/share/man/man8/xdm_selinux.8.gz
/usr/share/man/man8/xdm_unconfined_selinux.8.gz
/usr/share/man/man8/xenconsoled_selinux.8.gz
/usr/share/man/man8/xend_selinux.8.gz
/usr/share/man/man8/xenstored_selinux.8.gz
/usr/share/man/man8/xguest_dbusd_selinux.8.gz
/usr/share/man/man8/xguest_gkeyringd_selinux.8.gz
/usr/share/man/man8/xguest_selinux.8.gz
/usr/share/man/man8/xserver_selinux.8.gz
/usr/share/man/man8/ypbind_selinux.8.gz
/usr/share/man/man8/yppasswdd_selinux.8.gz
/usr/share/man/man8/ypserv_selinux.8.gz
/usr/share/man/man8/ypxfr_selinux.8.gz
/usr/share/man/man8/zabbix_agent_selinux.8.gz
/usr/share/man/man8/zabbix_script_selinux.8.gz
/usr/share/man/man8/zabbix_selinux.8.gz
/usr/share/man/man8/zarafa_deliver_selinux.8.gz
/usr/share/man/man8/zarafa_gateway_selinux.8.gz
/usr/share/man/man8/zarafa_ical_selinux.8.gz
/usr/share/man/man8/zarafa_indexer_selinux.8.gz
/usr/share/man/man8/zarafa_monitor_selinux.8.gz
/usr/share/man/man8/zarafa_server_selinux.8.gz
/usr/share/man/man8/zarafa_spooler_selinux.8.gz
/usr/share/man/man8/zebra_selinux.8.gz
/usr/share/man/man8/zoneminder_script_selinux.8.gz
/usr/share/man/man8/zoneminder_selinux.8.gz
/usr/share/man/man8/zos_remote_selinux.8.gz
/usr/share/man/ru/man8/ftpd_selinux.8.gz
/usr/share/man/ru/man8/httpd_selinux.8.gz
/usr/share/man/ru/man8/kerberos_selinux.8.gz
/usr/share/man/ru/man8/named_selinux.8.gz
/usr/share/man/ru/man8/nfs_selinux.8.gz
/usr/share/man/ru/man8/rsync_selinux.8.gz
/usr/share/man/ru/man8/samba_selinux.8.gz
/usr/share/man/ru/man8/ypbind_selinux.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Apr 9 21:25:34 2024