Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

selinux-policy-minimum-34.20-1.fc34 RPM for noarch

From Fedora 34 testing updates for x86_64 / Packages / s

Name: selinux-policy-minimum Distribution: Fedora Project
Version: 34.20 Vendor: Fedora Project
Release: 1.fc34 Build date: Fri Sep 17 17:16:57 2021
Group: Unspecified Build host: buildhw-x86-15.iad2.fedoraproject.org
Size: 14971097 Source RPM: selinux-policy-34.20-1.fc34.src.rpm
Packager: Fedora Project
Url: https://github.com/fedora-selinux/selinux-policy
Summary: SELinux minimum policy
SELinux minimum policy package.

Provides

Requires

License

GPLv2+

Changelog

* Thu Sep 16 2021 Zdenek Pytela <zpytela@redhat.com> - 34.20-1
  - cleanup unused codes
  - Fix typo in the gnome_exec_atspi() interface summary
  - Allow xdm execute gnome-atspi services
  - Allow gnome at-spi processes execute dbus-daemon in caller domain
  - Allow xdm watch dbus configuration
  - Allow xdm execute dbus-daemon in the caller domain
  - Revert "Allow xdm_t transition to system_dbusd_t"
  - Allow at-spi-bus-launcher read and map xdm pid files
  - Allow dhcpcd set its resource limits
  - Allow systemd-sleep get removable devices attributes
  - Allow usbmuxd get attributes of fs_t filesystems
* Thu Sep 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.19-1
  - Update the dhcp client local policy
  - Allow firewalld load kernel modules
  - Allow postfix_domain to sendto unix dgram sockets.
  - Allow systemd watch unallocated ttys
* Tue Sep 07 2021 Zdenek Pytela <zpytela@redhat.com> - 34.18-1
  - Allow ModemManager create a qipcrtr socket
  - Allow ModemManager request to load a kernel module
  - Label /usr/sbin/virtproxyd as virtd_exec_t
  - Allow communication between at-spi and gdm processes
  - Update ica_filetrans_named_content() with create_file_perms
  - Fix the gnome_atspi_domtrans() interface summary
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-2
  - Relabel /var/lib/rpm explicitly
  - Revert "Relabel /dev/dma_heap explicitly"
  - Add ica module to modules-targeted-contrib.conf
* Fri Aug 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.17-1
  - Add support for at-spi
  - Add permissions for system dbus processes
  - Allow various domains work with ICA crypto accelerator
  - Add ica module
  - Revert "Support using ICA crypto accelerator on s390x arch"
  - Allow systemd to delete fwupd var cache files
  - Allow vmtools_unconfined_t domain transition to rpm_script_t
  - Allow dirsrv read slapd tmpfs files
  - Revert "Label /dev/shm/dirsrv/ with dirsrv_tmpfs_t label"
  - Rename samba_exec() to samba_exec_net()
  - Support using ICA crypto accelerator on s390x arch
  - Allow systemd delete /run/systemd/default-hostname
  - Allow tcpdump read system state information in /proc
  - Allow rhsmcertd to create cache file in /var/cache/cloud-what
  - Allow D-bus communication between avahi and sosreport
  - Label /usr/libexec/gdm-runtime-config with xdm_exec_t
  - Allow lldpad send to kdumpctl over a unix dgram socket
  - Revert "Allow lldpad send to kdump over a unix dgram socket"
  - Allow chronyc respond to a user chronyd instance
  - Allow ptp4l respond to pmc
  - Allow lldpad send to unconfined_t over a unix dgram socket
  - Allow sssd to set samba setting
* Thu Aug 12 2021 Zdenek Pytela <zpytela@redhat.com> - 34.16-1
  - Allow systemd-timesyncd watch system dbus pid socket files
  - Allow firewalld drop capabilities
  - Allow rhsmcertd execute gpg
  - Allow lldpad send to kdump over a unix dgram socket
  - Allow systemd-gpt-auto-generator read udev pid files
  - Set default file context for /sys/firmware/efi/efivars
  - Allow tcpdump run as a systemd service
  - Allow nmap create and use netlink generic socket
  - Allow nscd watch system db files in /var/db
  - Allow cockpit_ws_t get attributes of fs_t filesystems
  - Allow sysadm acces to kernel module resources
  - Allow sysadm to read/write scsi files and manage shadow
  - Allow sysadm access to files_unconfined and bind rpc ports
  - Allow sysadm read and view kernel keyrings
  - Allow journal mmap and read var lib files
  - Allow tuned to read rhsmcertd config files
  - Allow bootloader to read tuned etc files
  - Label /usr/bin/qemu-storage-daemon with virtd_exec_t
* Fri Aug 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.15-1
  - Disable seccomp on CI containers
  - Allow systemd-machined stop generic service units
  - Allow virtlogd_t read process state of user domains
  - Add "/" at the beginning of dev/shm/var\.lib\.opencryptoki.* regexp
  - Label /dev/crypto/nx-gzip with accelerator_device_t
  - Update the policy for systemd-journal-upload
  - Allow unconfined domains to bpf all other domains
  - Confine rhsm service and rhsm-facts service as rhsmcertd_t
  - Allow fcoemon talk with unconfined user over unix domain datagram socket
  - Allow abrt_domain read and write z90crypt device
  - Allow mdadm read iscsi pid files
  - Change dev_getattr_infiniband_dev() to use getattr_chr_files_pattern()
  - Label /usr/lib/pcs/pcs_snmp_agent with cluster_exec_t
  - Allow hostapd bind UDP sockets to the dhcpd port
  - Unconfined domains should not be confined
* Wed Jul 14 2021 Zdenek Pytela <zpytela@redhat.com> - 34.14-1
  - Revert "update libs_filetrans_named_content() to have support for /usr/lib/debug directory"
  - Remove references to init_watch_path_type attribute
  - Remove all redundant watch permissions for systemd
  - Allow systemd watch non_security_file_type dirs, files, lnk_files
  - Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
  - Allow bacula get attributes of cgroup filesystems
  - Allow systemd-journal-upload watch logs and journal
  - Create a policy for systemd-journal-upload
  - Allow tcpdump and nmap get attributes of infiniband_device_t
  - Allow arpwatch get attributes of infiniband_device_t devices
  - Label /dev/wmi/dell-smbios as acpi_device_t
* Thu Jul 01 2021 Zdenek Pytela <zpytela@redhat.com> - 34.13-1
  - Allow radius map its library files
  - Allow nftables read NetworkManager unnamed pipes
  - Allow logrotate rotate container log files
* Tue Jun 22 2021 Zdenek Pytela <zpytela@redhat.com> - 34.12-2
  - Add a systemd service to check that SELinux is disabled properly
  - specfile: Add unowned dir to the macro
  - Relabel /dev/dma_heap explicitly
* Mon Jun 21 2021 Zdenek Pytela <zpytela@redhat.com> - 34.12-1
  - Label /dev/dma_heap/* char devices with dma_device_t
  - Revert "Label /dev/dma_heap/* char devices with dma_device_t"
  - Revert "Label /dev/dma_heap with dma_device_dir_t"
  - Revert "Associate dma_device_dir_t with device filesystem"
  - Add the lockdown integrity permission to dev_map_userio_dev()
  - Allow systemd-modules-load read/write tracefs files
  - Allow sssd watch /run/systemd
  - Label /usr/bin/arping plain file with netutils_exec_t
  - Label /run/fsck with fsadm_var_run_t
  - Label /usr/bin/Xwayland with xserver_exec_t
  - Allow systemd-timesyncd watch dbus runtime dir
  - Allow asterisk watch localization files
  - Allow iscsid read all process stat
  - iptables.fc: Add missing legacy-restore and legacy-save entries
  - Label /run/libvirt/common with virt_common_var_run_t
  - Label /.k5identity file allow read of this file to rpc.gssd
  - Make usbmuxd_t a daemon
* Wed Jun 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.11-1
  - Allow sanlock get attributes of cgroup filesystems
  - Associate dma_device_dir_t with device filesystem
  - Set default file context for /var/run/systemd instead of /run/systemd
  - Allow nmap create and use rdma socket
  - Allow pkcs-slotd create and use netlink_kobject_uevent_socket
* Sun Jun 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.10-1
  - Allow using opencryptoki for ipsec
  - Allow using opencryptoki for certmonger
  - Label var.lib.opencryptoki.* files and create pkcs_tmpfs_filetrans()
  - Label /dev/dma_heap with dma_device_dir_t
  - Allow syslogd watch non security dirs conditionally
  - Introduce logging_syslogd_list_non_security_dirs tunable
  - Remove openhpi module
  - Allow udev to watch fixed disk devices
  - Allow httpd_sys_script_t read, write, and map hugetlbfs files
  - Allow apcupsd get attributes of cgroup filesystems
* Thu May 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.9-1
  - Add kerberos object filetrans for nsswitchdomain
  - Allow fail2ban watch various log files
  - Add logging_watch_audit_log_files() and logging_watch_audit_log_dirs()
  - Remove further modules recently removed from refpolicy
  - Remove modules not shipped and not present in refpolicy
  - Revert "Add permission open to files_read_inherited_tmp_files() interface"
  - Revert "Allow pcp_pmlogger_t to use setrlimit BZ(1708951)"
  - Revert "Dontaudit logrotate to setrlimit itself. rhbz#1309604"
  - Revert "Allow cockpit_ws_t domain to set limits BZ(1701703)"
  - Dontaudit setrlimit for domains that exec systemctl
  - Allow kdump_t net_admin capability
  - Allow nsswitch_domain read init pid lnk_files
  - Label /dev/trng with random_device_t
  - Label /run/systemd/default-hostname with hostname_etc_t
  - Add default file context specification for dnf log files
  - Label /dev/zram[0-9]+ block device files with fixed_disk_device_t
  - Label /dev/udmabuf character device with dma_device_t
  - Label /dev/dma_heap/* char devices with dma_device_t
  - Label /dev/acpi_thermal_rel char device with acpi_device_t
* Thu May 20 2021 Zdenek Pytela <zpytela@redhat.com> - 34.8-1
  - Allow local_login_t nnp_transition to login_userdomain
  - Allow asterisk watch localization symlinks
  - Allow NetworkManager_t to watch /etc
  - Label /var/lib/kdump with kdump_var_lib_t
  - Allow amanda get attributes of cgroup filesystems
  - Allow sysadm_t nnp_domtrans to systemd_tmpfiles_t
  - Allow install_t nnp_domtrans to setfiles_mac_t
  - Allow fcoemon create sysfs files
* Thu May 13 2021 Zdenek Pytela <zpytela@redhat.com> - 34.7-1
  - Allow tgtd read and write infiniband devices
  - Add a comment on virt_sandbox booleans with empty content
  - Deprecate duplicate dev_write_generic_sock_files() interface
  - Allow vnstatd_t map vnstatd_var_lib_t files
  - Allow privoxy execmem
  - Allow pmdakvm read information from the debug filesystem
  - Add lockdown integrity into kernel_read_debugfs() and kernel_manage_debugfs()
  - Add permissions to delete lnk_files into gnome_delete_home_config()
  - Remove rules for inotifyfs
  - Remove rules for anon_inodefs
  - Allow systemd nnp_transition to login_userdomain
  - Allow unconfined_t write other processes perf_event records
  - Allow sysadm_t dbus chat with tuned
  - Allow tuned write profile files with file transition
  - Allow tuned manage perf_events
  - Make domains use kernel_write_perf_event() and kernel_manage_perf_event()
* Fri May 07 2021 Zdenek Pytela <zpytela@redhat.com> - 34.6-1
  - Make domains use kernel_write_perf_event() and kernel_manage_perf_event()
  - Add kernel_write_perf_event() and kernel_manage_perf_event()
  - Allow syslogd_t watch root and var directories
  - Allow unconfined_t read other processes perf_event records
  - Allow login_userdomain read and map /var/lib/systemd files
  - Allow NetworkManager watch its config dir
  - Allow NetworkManager read and write z90crypt device
  - Allow tgtd create and use rdma socket
  - Allow aide connect to init with a unix socket
* Tue May 04 2021 Zdenek Pytela <zpytela@redhat.com> - 34.5-1
  - Grant execmem to varnishlog_t
  - We no longer need signull for varnishlog_t
  - Add map permission to varnishd_read_lib_files
  - Allow systemd-sleep tlp_filetrans_named_content()
  - Allow systemd-sleep execute generic programs
  - Allow systemd-sleep execute shell
  - Allow to sendmail read/write kerberos host rcache files
  - Allow freshclam get attributes of cgroup filesystems
  - Fix context of /run/systemd/timesync
  - Allow udev create /run/gdm with proper type
  - Allow chronyc socket file transition in user temp directory
  - Allow virtlogd_t to create virt_var_lockd_t dir
  - Allow pluto IKEv2 / ESP over TCP
* Tue Apr 27 2021 Zdenek Pytela <zpytela@redhat.com> - 34.4-1
  - Allow domain create anonymous inodes
  - Add anon_inode class to the policy
  - Allow systemd-coredump getattr nsfs files and net_admin capability
  - Allow systemd-sleep transition to sysstat_t
  - Allow systemd-sleep transition to tlp_t
  - Allow systemd-sleep transition to unconfined_service_t on bin_t executables
  - Allow systemd-timedated watch runtime dir and its parent
  - Allow system dbusd read /var/lib symlinks
  - Allow unconfined_service_t confidentiality and integrity lockdown
  - Label /var/lib/brltty with brltty_var_lib_t
  - Allow domain and unconfined_domain_type watch /proc/PID dirs
  - Additional permission for confined users loging into graphic session
  - Make for screen fsetid/setuid/setgid permission conditional
  - Allow for confined users acces to wtmp and run utempter
* Fri Apr 09 2021 Zdenek Pytela <zpytela@redhat.com> - 34.3-1
  - Label /etc/redis as redis_conf_t
  - Add brltty new permissions required by new upstream version
  - Allow cups-lpd read its private runtime socket files
  - Dontaudit daemon open and read init_t file
  - Add file context specification for /var/tmp/tmp-inst
  - Allow brltty create and use bluetooth_socket
  - Allow usbmuxd get attributes of cgroup filesystems
* Tue Apr 06 2021 Zdenek Pytela <zpytela@redhat.com> - 34.2-1
  - Allow usbmuxd get attributes of cgroup filesystems
  - Allow accounts-daemon get attributes of cgroup filesystems
  - Allow pool-geoclue get attributes of cgroup filesystems
  - allow systemd-sleep to set timer for suspend-then-hibernate
  - Allow aide connect to systemd-userdbd with a unix socket
  - Add new interfaces with watch_mount and watch_with_perm permissions
  - Add file context specification for /usr/libexec/realmd
  - Allow /tmp file transition for dbus-daemon also for sock_file
  - Allow login_userdomain create cgroup files
  - Allow plymouthd_t exec generic program in bin directories
* Thu Apr 01 2021 Zdenek Pytela <zpytela@redhat.com> - 34.1-1
  - Change the package versioning
* Thu Apr 01 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-30
  - Allow plymouthd_t exec generic program in bin directories
  - Allow dhcpc_t domain transition to chronyc_t
  - Allow login_userdomain bind xmsg port
  - Allow ibacm the net_raw and sys_rawio capabilities
  - Allow nsswitch_domain read cgroup files
  - Allow systemd-sleep create hardware state information files
* Mon Mar 29 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-29
  - Add watch_with_perm_dirs_pattern file pattern
* Fri Mar 26 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-28
  - Allow arpwatch_t create netlink generic socket
  - Allow postgrey read network state
  - Add watch_mount_dirs_pattern file pattern
  - Allow bluetooth_t dbus chat with fwupd_t
  - Allow xdm_t watch accountsd lib directories
  - Add additional interfaces for watching /boot
  - Allow sssd_t get attributes of tmpfs filesystems
  - Allow local_login_t get attributes of tmpfs filesystems
* Tue Mar 23 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-27
  - Dontaudit domain the fowner capability
  - Extend fs_manage_nfsd_fs() to allow managing dirs as well
  - Allow spice-vdagentd watch systemd-logind session dirs
* Fri Mar 19 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-26
  - Allow xdm_t watch systemd-logind session dirs
  - Allow xdm_t transition to system_dbusd_t
  - Allow confined users login into graphic session
  - Allow login_userdomain watch systemd login session dirs
  - install_t: Allow NoNewPriv transition from systemd
  - Remove setuid/setgid capabilities from mysqld_t
  - Add context for new mariadbd executable files
  - Allow netutils_t create netlink generic socket
  - Allow systemd the audit_control capability conditionally
* Thu Mar 11 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-25
  - Allow polkit-agent-helper-1 read logind sessions files
  - Allow polkit-agent-helper read init state
  - Allow login_userdomain watch generic device dirs
  - Allow login_userdomain listen on bluetooth sockets
  - Allow user_t and staff_t bind netlink_generic_socket
  - Allow login_userdomain write inaccessible nodes
  - Allow transition from xdm domain to unconfined_t domain.
  - Add 'make validate' step to CI
  - Disallow user_t run su/sudo and staff_t run su
  - Fix typo in rsyncd.conf in rsync.if
  - Add an alias for nvme_device_t
  - Allow systemd watch and watch_reads unallocated ttys
* Tue Mar 02 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-24
  - Allow apmd watch generic device directories
  - Allow kdump load a new kernel
  - Add confidentiality lockdown permission to kernel_read_core_if()
  - Allow keepalived read nsfs files
  - Allow local_login_t get attributes of filesystems with ext attributes
  - Allow keepalived read/write its private memfd: objects
  - Add missing declaration in rpm_named_filetrans()
  - Change param description in cron interfaces to userdomain_prefix
* Tue Feb 23 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-23
  - iptables.fc: Add missing legacy entries
  - iptables.fc: Remove some duplicate entries
  - iptables.fc: Remove duplicate file context entries
  - Allow libvirtd to create generic netlink sockets
  - Allow libvirtd the fsetid capability
  - Allow libvirtd to read /run/utmp
  - Dontaudit sys_ptrace capability when calling systemctl
  - Allow udisksd to read /dev/random
  - Allow udisksd to watch files under /run/mount
  - Allow udisksd to watch /etc
  - Allow crond to watch user_cron_spool_t directories
  - Allow accountsd watch xdm config directories
  - Label /etc/avahi with avahi_conf_t
  - Allow sssd get cgroup filesystems attributes and search cgroup dirs
  - Allow systemd-hostnamed read udev runtime data
  - Remove dev_getattr_sysfs_fs() interface calls for particular domains
  - Allow domain stat the /sys filesystem
  - Dontaudit NetworkManager write to initrc_tmp_t pipes
  - policykit.te: Clean up watch rule for policykit_auth_t
  - Revert further unnecessary watch rules
  - Revert "Allow getty watch its private runtime files"
  - Allow systemd watch generic /var directories
  - Allow init watch network config files and lnk_files
* Fri Feb 19 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-22
  - Allow systemd-sleep get attributes of fixed disk device nodes
  - Complete initial policy for systemd-coredump
  - Label SDC(scini) Dell Driver
  - Allow upowerd to send syslog messages
  - Remove the disk write permissions from tlp_t
  - Label NVMe devices as fixed_disk_device_t
  - Allow rhsmcertd bind tcp sockets to a generic node
  - Allow systemd-importd manage machines.lock file
  - Allow unconfined integrity lockdown permission
  - Relocate confidentiality lockdown rule from unconfined_domain_type to unconfined
  - Allow systemd-machined manage systemd-userdbd runtime sockets
  - Enable systemd-sysctl domtrans for udev
  - Introduce kernel_load_unsigned_module interface and use it for couple domains
  - Allow gpg watch user gpg secrets dirs
  - Build also the container module in CI
  - Remove duplicate code from kernel.te
  - Allow restorecond to watch all non-auth directories
  - Allow restorecond to watch its config file
* Tue Feb 16 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-21
  - Allow unconfined integrity lockdown permission
  - Relocate confidentiality lockdown rule from unconfined_domain_type to unconfined
  - Allow systemd-machined manage systemd-userdbd runtime sockets
  - Enable systemd-sysctl domtrans for udev
  - Introduce kernel_load_unsigned_module interface and use it for couple domains
  - Allow gpg watch user gpg secrets dirs
  - Build also the container module in CI
  - Remove duplicate code from kernel.te
  - Allow restorecond to watch all non-auth directories
  - Allow restorecond to watch its config file
* Fri Feb 12 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-20
  - Allow userdomain watch various filesystem objects
  - Allow systemd-logind and systemd-sleep integrity lockdown permission
  - Allow unconfined_t and kprop_t to create krb5_0.rcache2 with the right context
  - Allow pulseaudio watch devices and systemd-logind session dirs
  - Allow abrt-dump-journal-* watch generic log dirs and /run/log/journal dir
  - Remove duplicate files_mounton_etc(init_t) call
  - Add watch permissions to manage_* object permissions sets
  - Allow journalctl watch generic log dirs and /run/log/journal dir
  - Label /etc/resolv.conf as net_conf_t even when it's a symlink
  - Allow SSSD to watch /var/run/NetworkManager
  - Allow dnsmasq_t to watch /etc
  - Remove unnecessary lines from the new watch interfaces
  - Fix docstring for init_watch_dir()
  - Allow xdm watch its private lib dirs, /etc, /usr
* Fri Feb 12 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-19
  - Bump version as Fedora 34 has been branched off rawhide
  - Allow xdm watch its private lib dirs, /etc, /usr
  - Allow systemd-importd create /run/systemd/machines.lock file
  - Allow rhsmcertd_t read kpatch lib files
  - Add integrity lockdown permission into dev_read_raw_memory()
  - Add confidentiality lockdown permission into fs_rw_tracefs_files()
  - Allow gpsd read and write ptp4l_t shared memory.
  - Allow colord watch its private lib files and /usr
  - Allow init watch_reads mount PID files
  - Allow IPsec and Certmonger to use opencryptoki services
* Sun Feb 07 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-18
  - Allow lockdown confidentiality for domains using perf_event
  - define lockdown class and access
  - Add perfmon capability for all domains using perf_event
  - Allow ptp4l_t bpf capability to run bpf programs
  - Revert "Allow ptp4l_t sys_admin capability to run bpf programs"
  - access_vectors: Add new capabilities to cap2
  - Allow systemd and systemd-resolved watch dbus pid objects
  - Add new watch interfaces in the base and userdomain policy
  - Add watch permissions for contrib packages
  - Allow xdm watch /usr directories
  - Allow getty watch its private runtime files
  - Add watch permissions for nscd and sssd
  - Add watch permissions for firewalld and NetworkManager
  - Add watch permissions for syslogd
  - Add watch permissions for systemd services
  - Allow restorecond watch /etc dirs
  - Add watch permissions for user domain types
  - Add watch permissions for init
  - Add basic watch interfaces for systemd
  - Add basic watch interfaces to the base module
  - Add additional watch object permissions sets and patterns
  - Allow init_t to watch localization symlinks
  - Allow init_t to watch mount directories
  - Allow init_t to watch cgroup files
  - Add basic watch patterns
  - Add new watch* permissions
* Fri Feb 05 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-17
  - Update .copr/make-srpm.sh to use rawhide as DISTGIT_BRANCH
  - Dontaudit setsched for rndc
  - Allow systemd-logind destroy entries in message queue
  - Add userdom_destroy_unpriv_user_msgq() interface
  - ci: Install build dependencies from koji
  - Dontaudit vhostmd to write in /var/lib/rpm/ dir and allow signull rpm
  - Add new cmadmin port for bfdd dameon
  - virtiofs supports Xattrs and SELinux
  - Allow domain write to systemd-resolved PID socket files
  - Label /var/run/pcsd-ruby.socket       socket with cluster_var_run_t type
  - Allow rhsmcertd_t domain transition to kpatch_t
  - Revert "Add kpatch_exec() interface"
  - Revert "Allow rhsmcertd execute kpatch"
  - Allow openvswitch create and use xfrm netlink sockets
  - Allow openvswitch_t perf_event write permission
  - Add kpatch_exec() interface
  - Allow rhsmcertd execute kpatch
  - Adds rule to allow glusterd to access RDMA socket
  - radius: Lexical sort of service-specific corenet rules by service name
  - VQP: Include IANA-assigned TCP/1589
  - radius: Allow binding to the VQP port (VMPS)
  - radius: Allow binding to the BDF Control and Echo ports
  - radius: Allow binding to the DHCP client port
  - radius: Allow net_raw; allow binding to the DHCP server ports
  - Add rsync_sys_admin tunable to allow rsync sys_admin capability
  - Allow staff_u run pam_console_apply
  - Allow openvswitch_t perf_event open permission
  - Allow sysadm read and write /dev/rfkill
  - Allow certmonger fsetid capability
  - Allow domain read usermodehelper state information
* Wed Jan 27 2021 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.7-16
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Fri Jan 22 2021 Petr Lautrbach <plautrba@redhat.com> - 3.14.7-15
  - Update specfile to not verify md5/size/mtime for active store files
  - Add /var/mnt equivalency to /mnt
  - Rebuild with SELinux userspace 3.2-rc1 release
* Fri Jan 08 2021 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-14
  - Allow domain read usermodehelper state information
  - Remove all kernel_read_usermodehelper_state() interface calls
  - .copr: improve timestamp format
  - Allow wireshark create and use rdma socket
  - Allow domain stat /proc filesystem
  - Remove all kernel_getattr_proc() interface calls
  - Revert "Allow passwd to get attributes in proc_t"
  - Revert "Allow dovecot_auth_t stat /proc filesystem"
  - Revert "Allow sssd, unix_chkpwd, groupadd stat /proc filesystem"
  - Allow sssd read /run/systemd directory
  - Label /dev/vhost-vdpa-[0-9]+ as vhost_device_t
* Thu Dec 17 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-13
  - Label /dev/isst_interface as cpu_device_t
  - Dontaudit firewalld dac_override capability
  - Allow ipsec set the context of a SPD entry to the default context
  - Build binary RPMs in CI
  - Add SRPM build scripts for COPR
* Tue Dec 15 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-12
  - Allow dovecot_auth_t stat /proc filesystem
  - Allow sysadm_u user and unconfined_domain_type manage perf_events
  - Allow pcp-pmcd manage perf_events
  - Add manage_perf_event_perms object permissions set
  - Add perf_event access vectors.
  - Allow sssd, unix_chkpwd, groupadd stat /proc filesystem
  - Allow stub-resolv.conf to be a symlink
  - sysnetwork.if: avoid directly referencing systemd_resolved_var_run_t
  - Create the systemd_dbus_chat_resolved() compatibility interface
  - Allow nsswitch-domain write to systemd-resolved PID socket files
  - Add systemd_resolved_write_pid_sock_files() interface
  - Add default file context for "/var/run/chrony-dhcp(/.*)?"
  - Allow timedatex dbus chat with cron system domain
  - Add cron_dbus_chat_system_job() interface
  - Allow systemd-logind manage init's pid files
* Wed Dec 09 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-11
  - Allow systemd-logind manage init's pid files
  - Allow tcsd the setgid capability
  - Allow systemd-resolved manage its private runtime symlinks
  - Update systemd_resolved_read_pid() to also read symlinks
  - Update systemd-sleep policy
  - Add groupadd_t fowner capability
  - Migrate to GitHub Actions
  - Update README.md to reflect the state after contrib and base merge
  - Add README.md announcing merging of selinux-policy and selinux-policy-contrib
  - Adapt .travis.yml to contrib merge
  - Merge contrib into the main repo
  - Prepare to merge contrib repo
  - Move stuff around to match the main repo
* Thu Nov 26 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-10
  - Allow Xephyr connect to 6000/tcp port and open user ptys
  - Allow kexec manage generic tmp files
  - Update targetd nfs & lvm
  - Add interface rpc_manage_exports
  - Merge selinux-policy and selinux-policy-contrib repos
* Tue Nov 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-9
  - Allow varnish map its private tmp files
  - Allow dovecot bind to smtp ports
  - Change fetchmail temporary files path to /var/spool/mail
  - Allow cups_pdf_t domain to communicate with unix_dgram_socket
  - Set file context for symlinks in /etc/httpd to etc_t
  - Allow rpmdb rw access to inherited console, ttys, and ptys
  - Allow dnsmasq read public files
  - Announce merging of selinux-policy and selinux-policy-contrib
  - Label /etc/resolv.conf as net_conf_t only if it is a plain file
  - Fix range for unreserved ports
  - Add files_search_non_security_dirs() interface
  - Introduce logging_syslogd_append_public_content tunable
  - Add miscfiles_append_public_files() interface
* Fri Nov 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-8
  - Set correct default file context for /usr/libexec/pcp/lib/*
  - Introduce rpmdb_t type
  - Allow slapd manage files/dirs in ldap certificates directory
  - Revert "Allow certmonger add new entries in a generic certificates directory"
  - Allow certmonger add new entries in a generic certificates directory
  - Allow slapd add new entries in ldap certificates directory
  - Remove retired PCP pmwebd and pmmgr daemons (since 5.0)
  - Let keepalived bind a raw socket
  - Add default file context for /usr/libexec/pcp/lib/*
  - squid: Allow net_raw capability when squid_use_tproxy is enabled
  - systemd: allow networkd to check namespaces
  - Add ability to read init_var_run_t where fs_read_efivarfs_files is allowed
  - Allow resolved to created varlink sockets and the domain to talk to it
  - selinux: tweak selinux_get_enforce_mode() to allow status page to be used
  - systemd: allow all systemd services to check selinux status
  - Set default file context for /var/lib/ipsec/nss
  - Allow user domains transition to rpmdb_t
  - Revert "Add miscfiles_add_entry_generic_cert_dirs() interface"
  - Revert "Add miscfiles_create_generic_cert_dirs() interface"
  - Update miscfiles_manage_all_certs() to include managing directories
  - Add miscfiles_create_generic_cert_dirs() interface
  - Add miscfiles_add_entry_generic_cert_dirs() interface
  - Revert "Label /var/run/zincati/public/motd.d/* as motd_var_run_t"
* Tue Nov 03 2020 Petr Lautrbach <plautrba@redhat.com> - 3.14.7-7
  - Rebuild with latest libsepol
  - Bump policy version to 33
* Thu Oct 22 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-6
  - rpc.fc: Include /etc/exports.d dir & files
  - Create chronyd_pid_filetrans() interface
  - Change invalid type redisd_t to redis_t in redis_stream_connect()
  - Revert "Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template"
  - Allow init dbus chat with kernel
  - Allow initrc_t create /run/chronyd-dhcp directory with a transition
  - Drop gcc from dependencies in Travis CI
  - fc_sort.py: Use "==" for comparing integers.
  - re-implement fc_sort in python
  - Remove invalid file context line
  - Drop git from dependencies in Travis CI
* Tue Oct 06 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-5
  - Remove empty line from rshd.fc
  - Allow systemd-logind read swap files
  - Add fstools_read_swap_files() interface
  - Allow dyntransition from sshd_t to unconfined_t
  - Removed adding to attribute unpriv_userdomain from userdom_unpriv_type template
* Fri Sep 25 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-4
  - Allow chronyd_t to accept and make NTS-KE connections
  - Allow domain write to an automount unnamed pipe
  - Label /var/run/zincati/public/motd.d/* as motd_var_run_t
  - Allow login programs to (only) read MOTD files and symlinks
  - Relabel /usr/sbin/charon-systemd as ipsec_exec_t
  - Confine systemd-sleep service
  - Add fstools_rw_swap_files() interface
  - Label 4460/tcp port as ntske_port_t
  - Add lvm_dbus_send_msg(), lvm_rw_var_run() interfaces
* Mon Sep 21 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-3
  - Check out the right -contrib branch in Travis
* Fri Sep 18 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-2
  - Allow openvswitch fowner capability and create netlink sockets
  - Allow additional permissions for gnome-initial-setup
  - Add to map non_security_files to the userdom_admin_user_template template
  - kernel/filesystem: Add exfat support (no extended attributes)
* Tue Sep 08 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.7-1
  - Bump version as Fedora 33 has been branched
  - Allow php-fpm write access to /var/run/redis/redis.sock
  - Allow journalctl to read and write to inherited user domain tty
  - Update rkt policy to allow rkt_t domain to read sysfs filesystem
  - Allow arpwatch create and use rdma socket
  - Allow plymouth sys_chroot capability
  - Allow gnome-initial-setup execute in a xdm sandbox
  - Add new devices and filesystem interfaces
* Mon Aug 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-25
  - Allow certmonger fowner capability
  - The nfsdcld service is now confined by SELinux
  - Change transitions for ~/.config/Yubico
  - Allow all users to connect to systemd-userdbd with a unix socket
  - Add file context for ~/.config/Yubico
  - Allow syslogd_t domain to read/write tmpfs systemd-bootchart files
  - Allow login_pgm attribute to get attributes in proc_t
  - Allow passwd to get attributes in proc_t
  - Revert "Allow passwd to get attributes in proc_t"
  - Revert "Allow login_pgm attribute to get attributes in proc_t"
  - Allow login_pgm attribute to get attributes in proc_t
  - Allow passwd to get attributes in proc_t
  - Allow traceroute_t and ping_t to bind generic nodes.
  - Create macro corenet_icmp_bind_generic_node()
  - Allow unconfined_t to node_bind icmp_sockets in node_t domain
* Thu Aug 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-24
  - Add ipa_helper_noatsecure() interface unconditionally
  - Conditionally allow nagios_plugin_domain dbus chat with init
  - Revert "Update allow rules set for nrpe_t domain"
  - Add ipa_helper_noatsecure() interface to ipa.if
  - Label /usr/libexec/qemu-pr-helper with virtd_exec_t
  - Allow kadmind manage kerberos host rcache
  - Allow nsswitch_domain to connect to systemd-machined using a unix socket
  - Define named file transition for sshd on /tmp/krb5_0.rcache2
  - Allow systemd-machined create userdbd runtime sock files
  - Disable kdbus module before updating
* Mon Aug 03 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-23
  - Revert "Add support for /sys/fs/kdbus and allow login_pgm domain to access it."
  - Revert "Add interface to allow types to associate with cgroup filesystems"
  - Revert "kdbusfs should not be accessible for now."
  - Revert "kdbusfs should not be accessible for now by default for shipped policies. It should be moved to kdbus.pp"
  - Revert "Add kdbus.pp policy to allow access /sys/fs/kdbus. It needs to go with own module because this is workaround for now to avoid SELinux in enforcing mode."
  - Remove the legacy kdbus module
  - Remove "kdbus = module" from modules-targeted-base.conf
* Thu Jul 30 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-22
  - Allow virtlockd only getattr and lock block devices
  - Allow qemu-ga read all non security file types conditionally
  - Allow virtlockd manage VMs posix file locks
  - Allow smbd get attributes of device files labeled samba_share_t
  - Label /tmp/krb5_0.rcache2 with krb5_host_rcache_t
  - Add a new httpd_can_manage_courier_spool boolean
  - Create interface courier_manage_spool_sockets() in courier policy to allow to search dir and allow manage sock files
  - Revert "Allow qemu-kvm read and write /dev/mapper/control"
  - Revert "Allow qemu read and write /dev/mapper/control"
  - Revert "Dontaudit and disallow sys_admin capability for keepalived_t domain"
  - Dontaudit pcscd_t setting its process scheduling
  - Dontaudit thumb_t setting its process scheduling
  - Allow munin domain transition with NoNewPrivileges
  - Add dev_lock_all_blk_files() interface
  - Allow auditd manage kerberos host rcache files
  - Allow systemd-logind dbus chat with fwupd
* Wed Jul 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.6-21
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Mon Jul 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-20
  - Align gen_tunable() syntax with sepolgen
* Fri Jul 10 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-19
  - Additional support for keepalived running in a namespace
  - Remove systemd_dbus_chat_resolved(pcp_pmie_t)
  - virt: remove the libvirt qmf rules
  - Allow certmonger manage dirsrv services
  - Run ipa_helper_noatsecure(oddjob_t) only if the interface exists
  - Allow domain dbus chat with systemd-resolved
  - Define file context for /var/run/netns directory only
  - Revert "Add support for fuse.glusterfs"
* Tue Jul 07 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-18
  - Allow oddjob_t process noatsecure permission for ipa_helper_t
  - Allow keepalived manage its private type runtime directories
  - Update irqbalance runtime directory file context
  - Allow irqbalance file transition for pid sock_files and directories
  - Allow systemd_private_tmp(dirsrv_tmp_t) instead of dirsrv_t
  - Allow virtlogd_t manage virt lib files
  - Allow systemd set efivarfs files attributes
  - Support systemctl --user in machinectl
  - Allow chkpwd_t read and write systemd-machined devpts character nodes
  - Allow init_t write to inherited systemd-logind sessions pipes
* Fri Jun 26 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-17
  - Allow pdns server to read system state
  - Allow irqbalance nnp_transition
  - Fix description tag for the sssd_connect_all_unreserved_ports tunable
  - Allow journalctl process set its resource limits
  - Add sssd_access_kernel_keys tunable to conditionally access kernel keys
  - Make keepalived work with network namespaces
  - Create sssd_connect_all_unreserved_ports boolean
  - Allow hypervkvpd to request kernel to load a module
  - Allow systemd_private_tmp(dirsrv_tmp_t)
  - Allow microcode_ctl get attributes of sysfs directories
  - Remove duplicate files_dontaudit_list_tmp(radiusd_t) line
  - Allow radiusd connect to gssproxy over unix domain stream socket
  - Add fwupd_cache_t file context for '/var/cache/fwupd(/.*)?'
  - Allow qemu read and write /dev/mapper/control
  - Allow tlp_t can_exec() tlp_exec_t
  - Dontaudit vpnc_t setting its process scheduling
  - Remove files_mmap_usr_files() call for particular domains
  - Allow dirsrv_t list cgroup directories
  - Crete the kerberos_write_kadmind_tmp_files() interface
  - Allow realmd_t dbus chat with accountsd_t
  - Label systemd-growfs and systemd-makefs       as fsadm_exec_t
  - Allow staff_u and user_u setattr generic usb devices
  - Allow sysadm_t dbus chat with accountsd
  - Modify kernel_rw_key() not to include append permission
  - Add kernel_rw_key() interface to access to kernel keyrings
  - Modify systemd_delete_private_tmp() to use delete_*_pattern macros
  - Allow systemd-modules to load kernel modules
  - Add cachefiles_dev_t as a typealias to cachefiles_device_t
  - Allow libkrb5 lib read client keytabs
  - Allow domain mmap usr_t files
  - Remove files_mmap_usr_files() call for systemd domains
  - Allow sshd write to kadmind temporary files
  - Do not audit staff_t and user_t attempts to manage boot_t entries
  - Add files_dontaudit_manage_boot_dirs() interface
  - Allow systemd-tty-ask-password-agent read efivarfs files
* Thu Jun 25 2020 Adam Williamson <awilliam@redhat.com> - 3.14.6-16
  - Fix scriptlets when /etc/selinux/config does not exist
* Thu Jun 04 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-15
  - Add fetchmail_uidl_cache_t type for /var/mail/.fetchmail.pid
  - Support multiple ways of tlp invocation
  - Allow qemu-kvm read and write /dev/mapper/control
  - Introduce logrotate_use_cifs boolean
  - Allow ptp4l_t sys_admin capability to run bpf programs
  - Allow to getattr files on an nsfs filesystem
  - httpd: Allow NoNewPriv transition from systemd
  - Allow rhsmd read process state of all domains and kernel threads
  - Allow rhsmd mmap /etc/passwd
  - Allow systemd-logind manage efivarfs files
  - Allow initrc_t tlp_filetrans_named_content()
  - Allow systemd_resolved_t to read efivarfs
  - Allow systemd_modules_load_t to read efivarfs
  - Introduce systemd_read_efivarfs_type attribute
  - Allow named transition for /run/tlp from a user shell
  - Allow ipsec_mgmt_t mmap ipsec_conf_file_t files
  - Add file context for /sys/kernel/tracing
* Tue May 19 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-14
  - Allow chronyc_t domain to use nsswitch
  - Allow nscd_socket_use() for domains in nscd_use() unconditionally
  - Add allow rules for lttng-sessiond domain
  - Label dirsrv systemd unit files and add dirsrv_systemctl()
  - Allow gluster geo-replication in rsync mode
  - Allow nagios_plugin_domain execute programs in bin directories
  - Allow sys_admin capability for domain labeled systemd_bootchart_t
  - Split the arping path regexp to 2 lines to prevent from relabeling
  - Allow tcpdump sniffing offloaded (RDMA) traffic
  - Revert "Change arping path regexp to work around fixfiles incorrect handling"
  - Change arping path regexp to work around fixfiles incorrect handling
  - Allow read efivarfs_t files by domains executing systemctl file
* Wed Apr 29 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-13
  - Update networkmanager_read_pid_files() to allow also list_dir_perms
  - Update policy for NetworkManager_ssh_t
  - Allow glusterd synchronize between master and slave
  - Allow spamc_t domain to read network state
  - Allow strongswan use tun/tap devices and keys
  - Allow systemd_userdbd_t domain logging to journal
* Tue Apr 14 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-12
  - Allow rngd create netlink_kobject_uevent_socket and read udev runtime files
  - Allow ssh-keygen create file in /var/lib/glusterd
  - Update ctdbd_manage_lib_files() to also allow mmap ctdbd_var_lib_t files
  - Merge ipa and ipa_custodia modules
  - Allow NetworkManager_ssh_t to execute_no_trans for binary ssh_exec_t
  - Introduce daemons_dontaudit_scheduling boolean
  - Modify path for arping in netutils.fc to match both bin and sbin
  - Change file context for /var/run/pam_ssh to match file transition
  - Add file context entry and file transition for /var/run/pam_timestamp
* Tue Mar 31 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-11
  - Allow NetworkManager manage dhcpd unit files
  - Update ninfod policy to add nnp transition from systemd to ninfod
  - Remove container interface calling by named_filetrans_domain.
* Wed Mar 25 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-10
  - Allow openfortivpn exec shell
  - Remove label session_dbusd_tmp_t for /run/user/USERID/systemd
  - Add ibacm_t ipc_lock capability
  - Allow ipsec_t connectto ipsec_mgmt_t
  - Remove ipa_custodia
  - Allow systemd-journald to read user_tmp_t symlinks
* Wed Mar 18 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-9
  - Allow zabbix_t manage and filetrans temporary socket files
  - Makefile: fix tmp/%.mod.fc target
* Fri Mar 13 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-8
  - Allow NetworkManager read its unit files and manage services
  - Add init_daemon_domain() for geoclue_t
  - Allow to use nnp_transition in pulseaudio_role
  - Allow pdns_t domain to map files in /usr.
  - Label all NetworkManager fortisslvpn plugins as openfortivpn_exec_t
  - Allow login_pgm create and bind on netlink_selinux_socket
* Mon Mar 09 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.6-7
  - Allow sssd read systemd-resolved runtime directory
  - Allow sssd read NetworkManager's runtime directory
  - Mark nm-cloud-setup systemd units as NetworkManager_unit_file_t
  - Allow system_mail_t to signull pcscd_t
  - Create interface pcscd_signull
  - Allow auditd poweroff or switch to single mode
* Fri Feb 28 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-6
  - Allow postfix stream connect to cyrus through runtime socket
  - Dontaudit daemons to set and get scheduling policy/parameters
* Sat Feb 22 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-5
  - Allow certmonger_t domain to read pkcs_slotd lock files
  - Allow httpd_t domain to mmap own var_lib_t files BZ(1804853)
  - Allow ipda_custodia_t to create udp_socket and added permission nlmsg_read for netlink_route_sockets
  - Make file context more variable for /usr/bin/fusermount and /bin/fusermount
  - Allow local_login_t domain to getattr cgroup filesystem
  - Allow systemd_logind_t domain to manage user_tmp_t char and block devices
* Tue Feb 18 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-4
  - Update virt_read_qemu_pid_files inteface
  - Allow systemd_logind_t domain to getattr cgroup filesystem
  - Allow systemd_logind_t domain to manage user_tmp_t char and block devices
  - Allow nsswitch_domain attribute to stream connect to systemd process
* Sun Feb 16 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-3
  - Allow systemd labeled as init_t to manage systemd_userdbd_runtime_t symlinks
  - Allow systemd_userdbd_t domain to read efivarfs files
* Sat Feb 15 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.6-2
  - Allow vhostmd communication with hosted virtual machines
  - Add and update virt interfaces
  - Update radiusd policy
  - Allow systemd_private_tmp(named_tmp_t)
  - Allow bacula dac_override capability
  - Allow systemd_networkd_t to read efivarfs
  - Add support for systemd-userdbd
  - Allow systemd system services read efivarfs files
* Sat Feb 15 2020 Lukas Vrabec  <lvrabec@redhat.com> - 3.14.6-1
  - Bump version to 3.14.6 because fedora 32 was branched
* Fri Feb 07 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-24
  - Allow ptp4l_t create and use packet_socket sockets
  - Allow ipa_custodia_t create and use netlink_route_socket sockets.
  - Allow networkmanager_t transition to setfiles_t
  - Create init_create_dirs boolean to allow init create directories
* Fri Jan 31 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-23
  - Allow thumb_t connect to system_dbusd_t BZ(1795044)
  - Allow saslauthd_t filetrans variable files for /tmp directory
  - Added apache create log dirs macro
  - Tiny documentation fix
  - Allow openfortivpn_t to manage net_conf_t files.
  - Introduce boolean openfortivpn_can_network_connect.
  - Dontaudit domain chronyd_t to list in user home dirs.
  - Allow init_t to create apache log dirs.
  - Add file transition for /dev/nvidia-uvm BZ(1770588)
  - Allow syslog_t to read efivarfs_t files
  - Add ioctl to term_dontaudit_use_ptmx macro
  - Update xserver_rw_session macro
* Thu Jan 30 2020 Fedora Release Engineering <releng@fedoraproject.org> - 3.14.5-22
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Fri Jan 24 2020 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-21
  - Dontaudit timedatex_t read file_contexts_t and validate security contexts
  - Make stratisd_t domain unconfined for now.
  - stratisd_t policy updates.
  - Label /var/spool/plymouth/boot.log as plymouthd_var_log_t
  - Label /stratis as stratisd_data_t
  - Allow opafm_t to create and use netlink rdma sockets.
  - Allow stratisd_t domain to read/write fixed disk devices and removable devices.
  - Added macro for stratisd to chat over dbus
  - Add dac_override capability to stratisd_t domain
  - Allow init_t set the nice level of all domains BZ(1778088)
  - Allow userdomain to chat with stratisd over dbus.
* Mon Jan 13 2020 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-20
  - Fix typo in anaconda SELinux module
  - Allow rtkit_t domain  to control scheduling for your install_t processes
  - Boolean: rngd_t to use executable memory
  - Allow rngd_t domain to use nsswitch BZ(1787661)
  - Allow exim to execute bin_t without domain trans
  - Allow create udp sockets for abrt_upload_watch_t domains
  - Drop label zebra_t for frr binaries
  - Allow NetworkManager_t domain to get status of samba services
  - Update milter policy to allow use sendmail
  - Modify file context for .local directory to match exactly BZ(1637401)
  - Allow init_t domain to create own socket files in /tmp
  - Allow ipsec_mgmt_t domain to mmap ipsec_conf_file_t files
  - Create files_create_non_security_dirs() interface
* Fri Dec 20 2019 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-19
  - Allow init_t nnp domain transition to kmod_t
  - Allow userdomain dbus chat with systemd_resolved_t
  - Allow init_t read and setattr on /var/lib/fprintd
  - Allow sysadm_t dbus chat with colord_t
  - Allow confined users run fwupdmgr
  - Allow confined users run machinectl
  - Allow systemd labeled as init_t domain to create dirs labeled as var_t
  - Allow systemd labeled as init_t do read/write tpm_device_t chr files BZ(1778079)
  - Add new file context rabbitmq_conf_t.
  - Allow journalctl read init state BZ(1731753)
  - Add fprintd_read_var_lib_dir and fprintd_setattr_var_lib_dir interfaces
  - Allow pulseaudio create .config and dgram sendto to unpriv_userdomain
  - Change type in transition for /var/cache/{dnf,yum} directory
  - Allow cockpit_ws_t read efivarfs_t BZ(1777085)
  - Allow abrt_dump_oops_t domain to create udp sockets BZ(1778030)
  - Allow named_t domain to mmap named_zone_t files BZ(1647493)
  - Make boinc_var_lib_t label system mountdir attribute
  - Allow stratis_t domain to request load modules
  - Update fail2ban policy
  - Allow spamd_update_t access antivirus_unit_file_t BZ(1774092)
  - Allow uuidd_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
  - Allow rdisc_t Domain trasition from sytemd into confined domain with NoNewPrivileges Systemd Security feature.
* Thu Nov 28 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-18
  - Allow systemd to read all proc
  - Introduce new type pdns_var_lib_t
  - Allow zebra_t domain to read files labled as nsfs_t.
  - Allow systemd to setattr on all device_nodes
  - Allow systemd to mounton and list all proc types
* Wed Nov 27 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-17
  - Fix nonexisting types in rtas_errd_rw_lock interface
  - Allow snmpd_t domain to trace processes in user namespace
  - Allow timedatex_t domain to read relatime clock and adjtime_t files
  - Allow zebra_t domain to execute zebra binaries
  - Label /usr/lib/NetworkManager/dispatcher as NetworkManager_initrc_exec_t
  - Allow ksmtuned_t domain to trace processes in user namespace
  - Allow systemd to read symlinks in /var/lib
  - Update dev_mounton_all_device_nodes() interface
  - Add the miscfiles_map_generic_certs macro to the sysnet_dns_name_resolve macro.
  - Allow systemd_domain to map files in /usr.
  - Allow strongswan start using swanctl method BZ(1773381)
  - Dontaudit systemd_tmpfiles_t getattr of all file types BZ(1772976)
* Thu Nov 21 2019 Zdenek Pytela <zpytela@redhat.com> - 3.14.5-16
  - Allow timedatex_t domain dbus chat with both confined and unconfined users
  - Allow timedatex_t domain dbus chat with unconfined users
  - Allow NetworkManager_t manage dhcpc_state_t BZ(1770698)
  - Make unconfined domains part of domain_named_attribute
  - Label tcp ports 24816,24817 as pulp_port_t
  - Remove duplicate entries for initrc_t in init.te
* Thu Nov 14 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-15
  - Increase SELinux userspace version which should be required.
* Wed Nov 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-14
  - Increase version of kernel compiled binary policy to 32 because of new SELinux userspace v3.0
* Wed Nov 13 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-13
  - Fix typo bugs in rtas_errd_read_lock() interface
  - cockpit: Drop cockpit-cert-session
  - Allow timedatex_t domain to systemctl chronyd domains
  - Allow ipa_helper_t to read kr5_keytab_t files
  - cockpit: Allow cockpit-session to read cockpit-tls state directory
  - Allow stratisd_t domain to read nvme and fixed disk devices
  - Update lldpad_t policy module
  - Dontaudit tmpreaper_t getting attributes from sysctl_type files
  - cockpit: Support https instance factory
  - Added macro for timedatex to chat over dbus.
  - Fix typo in dev_filetrans_all_named_dev()
  - Update files_manage_etc_runtime_files() interface to allow manage also dirs
  - Fix typo in cachefiles device
  - Dontaudit sys_admin capability for auditd_t domains
  - Allow x_userdomain to read adjtime_t files
  - Allow users using template userdom_unpriv_user_template() to run bpf tool
  - Allow x_userdomain to dbus_chat with timedatex.
* Sun Nov 03 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-12
  - Label /var/cache/nginx as httpd_cache_t
  - Allow abrt_upload_watch_t domain to send dgram msgs to kernel processes and stream connect to journald
  - Created dnsmasq_use_ipset boolean
  - Allow capability dac_override in logwatch_mail_t domain
  - Allow automount_t domain to execute ping in own SELinux domain (ping_t)
  - Allow tmpreaper_t domain to getattr files labeled as mtrr_device_t
  - Allow collectd_t domain to create netlink_generic_socket sockets
  - Allow rhsmcertd_t domain to read/write rtas_errd_var_lock_t files
  - Allow tmpwatch process labeled as tmpreaper_t domain to execute fuser command.
  - Label /etc/postfix/chroot-update as postfix_exec_t
  - Update tmpreaper_t policy due to fuser command
  - Allow kdump_t domain to create netlink_route and udp sockets
  - Allow stratisd to connect to dbus
  - Allow fail2ban_t domain to create netlink netfilter sockets.
  - Allow dovecot get filesystem quotas
  - Allow networkmanager_t domain to execute chronyd binary in chronyd_t domain. BZ(1765689)
  - Allow systemd-tmpfiles processes to set rlimit information
  - Allow cephfs to use xattrs for storing contexts
  - Update files_filetrans_named_content() interface to allow caller domain to create /oldroot /.profile with correct label etc_runtime_t
* Fri Oct 25 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-11
  - Allow confined users to run newaliases
  - Add interface mysql_dontaudit_rw_db()
  - Label /var/lib/xfsdump/inventory as amanda_var_lib_t
  - Allow tmpreaper_t domain to read all domains state
  - Make httpd_var_lib_t label system mountdir attribute
  - Update cockpit policy
  - Update timedatex policy to add macros, more detail below
  - Allow nagios_script_t domain list files labled sysfs_t.
  - Allow jetty_t domain search and read cgroup_t files.
  - Donaudit ifconfig_t domain to read/write mysqld_db_t files
  - Dontaudit domains read/write leaked pipes
* Tue Oct 22 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-10
  - Update timedatex policy to add macros, more detail below
  - Allow nagios_script_t domain list files labled sysfs_t.
  - Allow jetty_t domain search and read cgroup_t files.
  - Allow Gluster mount client to mount files_type
  - Dontaudit and disallow sys_admin capability for keepalived_t domain
  - Update numad policy to allow signull, kill, nice and trace processes
  - Allow ipmievd_t to RW watchdog devices
  - Allow ldconfig_t domain to manage initrc_tmp_t link files Allow netutils_t domain to write to initrc_tmp_t fifo files
  - Allow user domains to manage user session services
  - Allow staff and user users to get status of user systemd session
  - Update sudo_role_template() to allow caller domain to read syslog pid files
* Fri Oct 11 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-9
  - Allow networkmanager_t domain domain transition to chronyc_t domain BZ(1760226)
* Wed Oct 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-8
  - Update apache and pkcs policies to make active opencryptoki rules
  - Allow ipa_ods_exporter_t domain to read krb5_keytab files BZ(1759884)
* Wed Oct 09 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-7
  - Revert "nova.fc: fix duplicated slash"
  - Introduce new bolean httpd_use_opencryptoki
  - Add new interface apache_read_state()
  - Allow setroubleshoot_fixit_t to read random_device_t
  - Label /etc/named direcotory as named_conf_t BZ(1759495)
  - nova.fc: fix duplicated slash
  - Allow dkim to execute sendmail
  - Update virt_read_content interface to allow caller domain mmap virt_content_t block devices and files
  - Update aide_t domain to allow this tool to analyze also /dev filesystem
  - Update interface modutils_read_module_deps to allow caller domain also mmap modules_dep_t files BZ(1758634)
  - Allow avahi_t to send msg to xdm_t
  - Allow systemd_logind to read dosfs files & dirs Allow systemd-logind - a system service that manages user logins, to read files and list dirs on a DOS filesystem
  - Update dev_manage_sysfs() to support managing also lnk files BZ(1759019)
  - Allow systemd_logind_t domain to read blk_files in domain removable_device_t
  - Add new interface udev_getattr_rules_chr_files()
* Fri Oct 04 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-6
  - Update aide_t domain to allow this tool to analyze also /dev filesystem
  - Allow bitlbee_t domain map files in /usr
  - Allow stratisd to getattr of fixed disk device nodes
  - Add net_broadcast capability to openvswitch_t domain BZ(1716044)
  - Allow exim_t to read mysqld conf files if exim_can_connect_db is enabled. BZ(1756973)
  - Allow cobblerd_t domain search apache configuration dirs
  - Dontaudit NetworkManager_t domain to write to kdump temp pipies BZ(1750428)
  - Label /var/log/collectd.log as collectd_log_t
  - Allow boltd_t domain to manage sysfs files and dirs BZ(1754360)
  - Add fowner capability to the pcp_pmlogger_t domain BZ(1754767)
  - networkmanager: allow NetworkManager_t to create bluetooth_socket
  - Fix ipa_custodia_stream_connect interface
  - Add new interface udev_getattr_rules_chr_files()
  - Make dbus-broker service working on s390x arch
  - Add new interface dev_mounton_all_device_nodes()
  - Add new interface dev_create_all_files()
  - Allow systemd(init_t) to load kernel modules
  - Allow ldconfig_t domain to manage initrc_tmp_t objects
  - Add new interface init_write_initrc_tmp_pipes()
  - Add new interface init_manage_script_tmp_files()
  - Allow xdm_t setpcap capability in user namespace BZ(1756790)
  - Allow x_userdomain to mmap generic SSL certificates
  - Allow xdm_t domain to user netlink_route sockets BZ(1756791)
  - Update files_create_var_lib_dirs() interface to allow caller domain also set attributes of var_lib_t directory BZ(1754245)
  - Allow sudo userdomain to run rpm related commands
  - Add sys_admin capability for ipsec_t domain
  - Allow systemd_modules_load_t domain to read systemd pid files
  - Add new interface init_read_pid_files()
  - Allow systemd labeled as init_t domain to manage faillog_t objects
  - Add file context ipsec_var_run_t for /var/run/charon\.dck to ipsec.fc
  - Make ipa_custodia policy active
* Fri Sep 20 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-5
  - Fix ipa_custodia_stream_connect interface
  - Allow systemd_modules_load_t domain to read systemd pid files
  - Add new interface init_read_pid_files()
  - Allow systemd labeled as init_t domain to manage faillog_t objects
  - Add file context ipsec_var_run_t for /var/run/charon\.dck to ipsec.fc
* Fri Sep 20 2019 Lukas Vrabec <lvrabec@redhat.com> - 3.14.5-4
  - Run ipa-custodia as ipa_custodia_t
  - Update webalizer_t SELinux policy
  - Dontaudit thumb_t domain to getattr of nsfs_t files BZ(1753598)
  - Allow rhsmcertd_t domain to read rtas_errd lock files
  - Add new interface rtas_errd_read_lock()
  - Update allow rules set for nrpe_t domain
  - Update timedatex SELinux policy to to sychronizate time with GNOME and add new macro chronyd_service_status to chronyd.if
  - Allow avahi_t to send msg to lpr_t
  - Label /dev/shm/dirsrv/ with dirsrv_tmpfs_t label
  - Allow dlm_controld_t domain to read random device
  - Label libvirt drivers as virtd_exec_t
  - Add sys_ptrace capability to pcp_pmlogger_t domain BZ(1751816)
  - Allow gssproxy_t domain read state of all processes on system
  - Add new macro systemd_timedated_status to systemd.if to get timedated service status
  - Introduce xdm_manage_bootloader booelan
  - Revert "Unconfined domains, need to create content with the correct labels"
  - Allow xdm_t domain to read sssd pid files BZ(1753240)
  - Move open, audit_access, and execmod to common file perms

Files

/etc/selinux/minimum
/etc/selinux/minimum/.policy.sha512
/etc/selinux/minimum/booleans.subs_dist
/etc/selinux/minimum/contexts
/etc/selinux/minimum/contexts/customizable_types
/etc/selinux/minimum/contexts/dbus_contexts
/etc/selinux/minimum/contexts/default_contexts
/etc/selinux/minimum/contexts/default_type
/etc/selinux/minimum/contexts/failsafe_context
/etc/selinux/minimum/contexts/files
/etc/selinux/minimum/contexts/files/file_contexts
/etc/selinux/minimum/contexts/files/file_contexts.bin
/etc/selinux/minimum/contexts/files/file_contexts.homedirs
/etc/selinux/minimum/contexts/files/file_contexts.homedirs.bin
/etc/selinux/minimum/contexts/files/file_contexts.local
/etc/selinux/minimum/contexts/files/file_contexts.local.bin
/etc/selinux/minimum/contexts/files/file_contexts.subs
/etc/selinux/minimum/contexts/files/file_contexts.subs_dist
/etc/selinux/minimum/contexts/files/media
/etc/selinux/minimum/contexts/initrc_context
/etc/selinux/minimum/contexts/lxc_contexts
/etc/selinux/minimum/contexts/openssh_contexts
/etc/selinux/minimum/contexts/removable_context
/etc/selinux/minimum/contexts/securetty_types
/etc/selinux/minimum/contexts/sepgsql_contexts
/etc/selinux/minimum/contexts/snapperd_contexts
/etc/selinux/minimum/contexts/systemd_contexts
/etc/selinux/minimum/contexts/userhelper_context
/etc/selinux/minimum/contexts/users
/etc/selinux/minimum/contexts/users/guest_u
/etc/selinux/minimum/contexts/users/root
/etc/selinux/minimum/contexts/users/staff_u
/etc/selinux/minimum/contexts/users/sysadm_u
/etc/selinux/minimum/contexts/users/unconfined_u
/etc/selinux/minimum/contexts/users/user_u
/etc/selinux/minimum/contexts/users/xguest_u
/etc/selinux/minimum/contexts/virtual_domain_context
/etc/selinux/minimum/contexts/virtual_image_context
/etc/selinux/minimum/contexts/x_contexts
/etc/selinux/minimum/logins
/etc/selinux/minimum/policy
/etc/selinux/minimum/policy/policy.33
/etc/selinux/minimum/setrans.conf
/etc/selinux/minimum/seusers
/usr/share/selinux/minimum
/usr/share/selinux/minimum/base.lst
/usr/share/selinux/minimum/modules-base.lst
/usr/share/selinux/minimum/modules-contrib.lst
/usr/share/selinux/minimum/nonbasemodules.lst
/var/lib/selinux/minimum
/var/lib/selinux/minimum/active
/var/lib/selinux/minimum/active/commit_num
/var/lib/selinux/minimum/active/file_contexts
/var/lib/selinux/minimum/active/file_contexts.homedirs
/var/lib/selinux/minimum/active/homedir_template
/var/lib/selinux/minimum/active/modules
/var/lib/selinux/minimum/active/modules/100/abrt
/var/lib/selinux/minimum/active/modules/100/abrt/cil
/var/lib/selinux/minimum/active/modules/100/abrt/hll
/var/lib/selinux/minimum/active/modules/100/abrt/lang_ext
/var/lib/selinux/minimum/active/modules/100/accountsd
/var/lib/selinux/minimum/active/modules/100/accountsd/cil
/var/lib/selinux/minimum/active/modules/100/accountsd/hll
/var/lib/selinux/minimum/active/modules/100/accountsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/acct
/var/lib/selinux/minimum/active/modules/100/acct/cil
/var/lib/selinux/minimum/active/modules/100/acct/hll
/var/lib/selinux/minimum/active/modules/100/acct/lang_ext
/var/lib/selinux/minimum/active/modules/100/afs
/var/lib/selinux/minimum/active/modules/100/afs/cil
/var/lib/selinux/minimum/active/modules/100/afs/hll
/var/lib/selinux/minimum/active/modules/100/afs/lang_ext
/var/lib/selinux/minimum/active/modules/100/aiccu
/var/lib/selinux/minimum/active/modules/100/aiccu/cil
/var/lib/selinux/minimum/active/modules/100/aiccu/hll
/var/lib/selinux/minimum/active/modules/100/aiccu/lang_ext
/var/lib/selinux/minimum/active/modules/100/aide
/var/lib/selinux/minimum/active/modules/100/aide/cil
/var/lib/selinux/minimum/active/modules/100/aide/hll
/var/lib/selinux/minimum/active/modules/100/aide/lang_ext
/var/lib/selinux/minimum/active/modules/100/ajaxterm
/var/lib/selinux/minimum/active/modules/100/ajaxterm/cil
/var/lib/selinux/minimum/active/modules/100/ajaxterm/hll
/var/lib/selinux/minimum/active/modules/100/ajaxterm/lang_ext
/var/lib/selinux/minimum/active/modules/100/alsa
/var/lib/selinux/minimum/active/modules/100/alsa/cil
/var/lib/selinux/minimum/active/modules/100/alsa/hll
/var/lib/selinux/minimum/active/modules/100/alsa/lang_ext
/var/lib/selinux/minimum/active/modules/100/amanda
/var/lib/selinux/minimum/active/modules/100/amanda/cil
/var/lib/selinux/minimum/active/modules/100/amanda/hll
/var/lib/selinux/minimum/active/modules/100/amanda/lang_ext
/var/lib/selinux/minimum/active/modules/100/amtu
/var/lib/selinux/minimum/active/modules/100/amtu/cil
/var/lib/selinux/minimum/active/modules/100/amtu/hll
/var/lib/selinux/minimum/active/modules/100/amtu/lang_ext
/var/lib/selinux/minimum/active/modules/100/anaconda
/var/lib/selinux/minimum/active/modules/100/anaconda/cil
/var/lib/selinux/minimum/active/modules/100/anaconda/hll
/var/lib/selinux/minimum/active/modules/100/anaconda/lang_ext
/var/lib/selinux/minimum/active/modules/100/antivirus
/var/lib/selinux/minimum/active/modules/100/antivirus/cil
/var/lib/selinux/minimum/active/modules/100/antivirus/hll
/var/lib/selinux/minimum/active/modules/100/antivirus/lang_ext
/var/lib/selinux/minimum/active/modules/100/apache
/var/lib/selinux/minimum/active/modules/100/apache/cil
/var/lib/selinux/minimum/active/modules/100/apache/hll
/var/lib/selinux/minimum/active/modules/100/apache/lang_ext
/var/lib/selinux/minimum/active/modules/100/apcupsd
/var/lib/selinux/minimum/active/modules/100/apcupsd/cil
/var/lib/selinux/minimum/active/modules/100/apcupsd/hll
/var/lib/selinux/minimum/active/modules/100/apcupsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/apm
/var/lib/selinux/minimum/active/modules/100/apm/cil
/var/lib/selinux/minimum/active/modules/100/apm/hll
/var/lib/selinux/minimum/active/modules/100/apm/lang_ext
/var/lib/selinux/minimum/active/modules/100/application
/var/lib/selinux/minimum/active/modules/100/application/cil
/var/lib/selinux/minimum/active/modules/100/application/hll
/var/lib/selinux/minimum/active/modules/100/application/lang_ext
/var/lib/selinux/minimum/active/modules/100/arpwatch
/var/lib/selinux/minimum/active/modules/100/arpwatch/cil
/var/lib/selinux/minimum/active/modules/100/arpwatch/hll
/var/lib/selinux/minimum/active/modules/100/arpwatch/lang_ext
/var/lib/selinux/minimum/active/modules/100/asterisk
/var/lib/selinux/minimum/active/modules/100/asterisk/cil
/var/lib/selinux/minimum/active/modules/100/asterisk/hll
/var/lib/selinux/minimum/active/modules/100/asterisk/lang_ext
/var/lib/selinux/minimum/active/modules/100/auditadm
/var/lib/selinux/minimum/active/modules/100/auditadm/cil
/var/lib/selinux/minimum/active/modules/100/auditadm/hll
/var/lib/selinux/minimum/active/modules/100/auditadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/authconfig
/var/lib/selinux/minimum/active/modules/100/authconfig/cil
/var/lib/selinux/minimum/active/modules/100/authconfig/hll
/var/lib/selinux/minimum/active/modules/100/authconfig/lang_ext
/var/lib/selinux/minimum/active/modules/100/authlogin
/var/lib/selinux/minimum/active/modules/100/authlogin/cil
/var/lib/selinux/minimum/active/modules/100/authlogin/hll
/var/lib/selinux/minimum/active/modules/100/authlogin/lang_ext
/var/lib/selinux/minimum/active/modules/100/automount
/var/lib/selinux/minimum/active/modules/100/automount/cil
/var/lib/selinux/minimum/active/modules/100/automount/hll
/var/lib/selinux/minimum/active/modules/100/automount/lang_ext
/var/lib/selinux/minimum/active/modules/100/avahi
/var/lib/selinux/minimum/active/modules/100/avahi/cil
/var/lib/selinux/minimum/active/modules/100/avahi/hll
/var/lib/selinux/minimum/active/modules/100/avahi/lang_ext
/var/lib/selinux/minimum/active/modules/100/awstats
/var/lib/selinux/minimum/active/modules/100/awstats/cil
/var/lib/selinux/minimum/active/modules/100/awstats/hll
/var/lib/selinux/minimum/active/modules/100/awstats/lang_ext
/var/lib/selinux/minimum/active/modules/100/bacula
/var/lib/selinux/minimum/active/modules/100/bacula/cil
/var/lib/selinux/minimum/active/modules/100/bacula/hll
/var/lib/selinux/minimum/active/modules/100/bacula/lang_ext
/var/lib/selinux/minimum/active/modules/100/base
/var/lib/selinux/minimum/active/modules/100/base/cil
/var/lib/selinux/minimum/active/modules/100/base/hll
/var/lib/selinux/minimum/active/modules/100/base/lang_ext
/var/lib/selinux/minimum/active/modules/100/bcfg2
/var/lib/selinux/minimum/active/modules/100/bcfg2/cil
/var/lib/selinux/minimum/active/modules/100/bcfg2/hll
/var/lib/selinux/minimum/active/modules/100/bcfg2/lang_ext
/var/lib/selinux/minimum/active/modules/100/bind
/var/lib/selinux/minimum/active/modules/100/bind/cil
/var/lib/selinux/minimum/active/modules/100/bind/hll
/var/lib/selinux/minimum/active/modules/100/bind/lang_ext
/var/lib/selinux/minimum/active/modules/100/bitlbee
/var/lib/selinux/minimum/active/modules/100/bitlbee/cil
/var/lib/selinux/minimum/active/modules/100/bitlbee/hll
/var/lib/selinux/minimum/active/modules/100/bitlbee/lang_ext
/var/lib/selinux/minimum/active/modules/100/blkmapd
/var/lib/selinux/minimum/active/modules/100/blkmapd/cil
/var/lib/selinux/minimum/active/modules/100/blkmapd/hll
/var/lib/selinux/minimum/active/modules/100/blkmapd/lang_ext
/var/lib/selinux/minimum/active/modules/100/blueman
/var/lib/selinux/minimum/active/modules/100/blueman/cil
/var/lib/selinux/minimum/active/modules/100/blueman/hll
/var/lib/selinux/minimum/active/modules/100/blueman/lang_ext
/var/lib/selinux/minimum/active/modules/100/bluetooth
/var/lib/selinux/minimum/active/modules/100/bluetooth/cil
/var/lib/selinux/minimum/active/modules/100/bluetooth/hll
/var/lib/selinux/minimum/active/modules/100/bluetooth/lang_ext
/var/lib/selinux/minimum/active/modules/100/boinc
/var/lib/selinux/minimum/active/modules/100/boinc/cil
/var/lib/selinux/minimum/active/modules/100/boinc/hll
/var/lib/selinux/minimum/active/modules/100/boinc/lang_ext
/var/lib/selinux/minimum/active/modules/100/boltd
/var/lib/selinux/minimum/active/modules/100/boltd/cil
/var/lib/selinux/minimum/active/modules/100/boltd/hll
/var/lib/selinux/minimum/active/modules/100/boltd/lang_ext
/var/lib/selinux/minimum/active/modules/100/bootloader
/var/lib/selinux/minimum/active/modules/100/bootloader/cil
/var/lib/selinux/minimum/active/modules/100/bootloader/hll
/var/lib/selinux/minimum/active/modules/100/bootloader/lang_ext
/var/lib/selinux/minimum/active/modules/100/brctl
/var/lib/selinux/minimum/active/modules/100/brctl/cil
/var/lib/selinux/minimum/active/modules/100/brctl/hll
/var/lib/selinux/minimum/active/modules/100/brctl/lang_ext
/var/lib/selinux/minimum/active/modules/100/brltty
/var/lib/selinux/minimum/active/modules/100/brltty/cil
/var/lib/selinux/minimum/active/modules/100/brltty/hll
/var/lib/selinux/minimum/active/modules/100/brltty/lang_ext
/var/lib/selinux/minimum/active/modules/100/bugzilla
/var/lib/selinux/minimum/active/modules/100/bugzilla/cil
/var/lib/selinux/minimum/active/modules/100/bugzilla/hll
/var/lib/selinux/minimum/active/modules/100/bugzilla/lang_ext
/var/lib/selinux/minimum/active/modules/100/bumblebee
/var/lib/selinux/minimum/active/modules/100/bumblebee/cil
/var/lib/selinux/minimum/active/modules/100/bumblebee/hll
/var/lib/selinux/minimum/active/modules/100/bumblebee/lang_ext
/var/lib/selinux/minimum/active/modules/100/cachefilesd
/var/lib/selinux/minimum/active/modules/100/cachefilesd/cil
/var/lib/selinux/minimum/active/modules/100/cachefilesd/hll
/var/lib/selinux/minimum/active/modules/100/cachefilesd/lang_ext
/var/lib/selinux/minimum/active/modules/100/calamaris
/var/lib/selinux/minimum/active/modules/100/calamaris/cil
/var/lib/selinux/minimum/active/modules/100/calamaris/hll
/var/lib/selinux/minimum/active/modules/100/calamaris/lang_ext
/var/lib/selinux/minimum/active/modules/100/callweaver
/var/lib/selinux/minimum/active/modules/100/callweaver/cil
/var/lib/selinux/minimum/active/modules/100/callweaver/hll
/var/lib/selinux/minimum/active/modules/100/callweaver/lang_ext
/var/lib/selinux/minimum/active/modules/100/canna
/var/lib/selinux/minimum/active/modules/100/canna/cil
/var/lib/selinux/minimum/active/modules/100/canna/hll
/var/lib/selinux/minimum/active/modules/100/canna/lang_ext
/var/lib/selinux/minimum/active/modules/100/ccs
/var/lib/selinux/minimum/active/modules/100/ccs/cil
/var/lib/selinux/minimum/active/modules/100/ccs/hll
/var/lib/selinux/minimum/active/modules/100/ccs/lang_ext
/var/lib/selinux/minimum/active/modules/100/cdrecord
/var/lib/selinux/minimum/active/modules/100/cdrecord/cil
/var/lib/selinux/minimum/active/modules/100/cdrecord/hll
/var/lib/selinux/minimum/active/modules/100/cdrecord/lang_ext
/var/lib/selinux/minimum/active/modules/100/certmaster
/var/lib/selinux/minimum/active/modules/100/certmaster/cil
/var/lib/selinux/minimum/active/modules/100/certmaster/hll
/var/lib/selinux/minimum/active/modules/100/certmaster/lang_ext
/var/lib/selinux/minimum/active/modules/100/certmonger
/var/lib/selinux/minimum/active/modules/100/certmonger/cil
/var/lib/selinux/minimum/active/modules/100/certmonger/hll
/var/lib/selinux/minimum/active/modules/100/certmonger/lang_ext
/var/lib/selinux/minimum/active/modules/100/certwatch
/var/lib/selinux/minimum/active/modules/100/certwatch/cil
/var/lib/selinux/minimum/active/modules/100/certwatch/hll
/var/lib/selinux/minimum/active/modules/100/certwatch/lang_ext
/var/lib/selinux/minimum/active/modules/100/cfengine
/var/lib/selinux/minimum/active/modules/100/cfengine/cil
/var/lib/selinux/minimum/active/modules/100/cfengine/hll
/var/lib/selinux/minimum/active/modules/100/cfengine/lang_ext
/var/lib/selinux/minimum/active/modules/100/cgroup
/var/lib/selinux/minimum/active/modules/100/cgroup/cil
/var/lib/selinux/minimum/active/modules/100/cgroup/hll
/var/lib/selinux/minimum/active/modules/100/cgroup/lang_ext
/var/lib/selinux/minimum/active/modules/100/chrome
/var/lib/selinux/minimum/active/modules/100/chrome/cil
/var/lib/selinux/minimum/active/modules/100/chrome/hll
/var/lib/selinux/minimum/active/modules/100/chrome/lang_ext
/var/lib/selinux/minimum/active/modules/100/chronyd
/var/lib/selinux/minimum/active/modules/100/chronyd/cil
/var/lib/selinux/minimum/active/modules/100/chronyd/hll
/var/lib/selinux/minimum/active/modules/100/chronyd/lang_ext
/var/lib/selinux/minimum/active/modules/100/cinder
/var/lib/selinux/minimum/active/modules/100/cinder/cil
/var/lib/selinux/minimum/active/modules/100/cinder/hll
/var/lib/selinux/minimum/active/modules/100/cinder/lang_ext
/var/lib/selinux/minimum/active/modules/100/cipe
/var/lib/selinux/minimum/active/modules/100/cipe/cil
/var/lib/selinux/minimum/active/modules/100/cipe/hll
/var/lib/selinux/minimum/active/modules/100/cipe/lang_ext
/var/lib/selinux/minimum/active/modules/100/clock
/var/lib/selinux/minimum/active/modules/100/clock/cil
/var/lib/selinux/minimum/active/modules/100/clock/hll
/var/lib/selinux/minimum/active/modules/100/clock/lang_ext
/var/lib/selinux/minimum/active/modules/100/clogd
/var/lib/selinux/minimum/active/modules/100/clogd/cil
/var/lib/selinux/minimum/active/modules/100/clogd/hll
/var/lib/selinux/minimum/active/modules/100/clogd/lang_ext
/var/lib/selinux/minimum/active/modules/100/cloudform
/var/lib/selinux/minimum/active/modules/100/cloudform/cil
/var/lib/selinux/minimum/active/modules/100/cloudform/hll
/var/lib/selinux/minimum/active/modules/100/cloudform/lang_ext
/var/lib/selinux/minimum/active/modules/100/cmirrord
/var/lib/selinux/minimum/active/modules/100/cmirrord/cil
/var/lib/selinux/minimum/active/modules/100/cmirrord/hll
/var/lib/selinux/minimum/active/modules/100/cmirrord/lang_ext
/var/lib/selinux/minimum/active/modules/100/cobbler
/var/lib/selinux/minimum/active/modules/100/cobbler/cil
/var/lib/selinux/minimum/active/modules/100/cobbler/hll
/var/lib/selinux/minimum/active/modules/100/cobbler/lang_ext
/var/lib/selinux/minimum/active/modules/100/cockpit
/var/lib/selinux/minimum/active/modules/100/cockpit/cil
/var/lib/selinux/minimum/active/modules/100/cockpit/hll
/var/lib/selinux/minimum/active/modules/100/cockpit/lang_ext
/var/lib/selinux/minimum/active/modules/100/collectd
/var/lib/selinux/minimum/active/modules/100/collectd/cil
/var/lib/selinux/minimum/active/modules/100/collectd/hll
/var/lib/selinux/minimum/active/modules/100/collectd/lang_ext
/var/lib/selinux/minimum/active/modules/100/colord
/var/lib/selinux/minimum/active/modules/100/colord/cil
/var/lib/selinux/minimum/active/modules/100/colord/hll
/var/lib/selinux/minimum/active/modules/100/colord/lang_ext
/var/lib/selinux/minimum/active/modules/100/comsat
/var/lib/selinux/minimum/active/modules/100/comsat/cil
/var/lib/selinux/minimum/active/modules/100/comsat/hll
/var/lib/selinux/minimum/active/modules/100/comsat/lang_ext
/var/lib/selinux/minimum/active/modules/100/condor
/var/lib/selinux/minimum/active/modules/100/condor/cil
/var/lib/selinux/minimum/active/modules/100/condor/hll
/var/lib/selinux/minimum/active/modules/100/condor/lang_ext
/var/lib/selinux/minimum/active/modules/100/conman
/var/lib/selinux/minimum/active/modules/100/conman/cil
/var/lib/selinux/minimum/active/modules/100/conman/hll
/var/lib/selinux/minimum/active/modules/100/conman/lang_ext
/var/lib/selinux/minimum/active/modules/100/conntrackd
/var/lib/selinux/minimum/active/modules/100/conntrackd/cil
/var/lib/selinux/minimum/active/modules/100/conntrackd/hll
/var/lib/selinux/minimum/active/modules/100/conntrackd/lang_ext
/var/lib/selinux/minimum/active/modules/100/consolekit
/var/lib/selinux/minimum/active/modules/100/consolekit/cil
/var/lib/selinux/minimum/active/modules/100/consolekit/hll
/var/lib/selinux/minimum/active/modules/100/consolekit/lang_ext
/var/lib/selinux/minimum/active/modules/100/couchdb
/var/lib/selinux/minimum/active/modules/100/couchdb/cil
/var/lib/selinux/minimum/active/modules/100/couchdb/hll
/var/lib/selinux/minimum/active/modules/100/couchdb/lang_ext
/var/lib/selinux/minimum/active/modules/100/courier
/var/lib/selinux/minimum/active/modules/100/courier/cil
/var/lib/selinux/minimum/active/modules/100/courier/hll
/var/lib/selinux/minimum/active/modules/100/courier/lang_ext
/var/lib/selinux/minimum/active/modules/100/cpucontrol
/var/lib/selinux/minimum/active/modules/100/cpucontrol/cil
/var/lib/selinux/minimum/active/modules/100/cpucontrol/hll
/var/lib/selinux/minimum/active/modules/100/cpucontrol/lang_ext
/var/lib/selinux/minimum/active/modules/100/cpufreqselector
/var/lib/selinux/minimum/active/modules/100/cpufreqselector/cil
/var/lib/selinux/minimum/active/modules/100/cpufreqselector/hll
/var/lib/selinux/minimum/active/modules/100/cpufreqselector/lang_ext
/var/lib/selinux/minimum/active/modules/100/cpuplug
/var/lib/selinux/minimum/active/modules/100/cpuplug/cil
/var/lib/selinux/minimum/active/modules/100/cpuplug/hll
/var/lib/selinux/minimum/active/modules/100/cpuplug/lang_ext
/var/lib/selinux/minimum/active/modules/100/cron
/var/lib/selinux/minimum/active/modules/100/cron/cil
/var/lib/selinux/minimum/active/modules/100/cron/hll
/var/lib/selinux/minimum/active/modules/100/cron/lang_ext
/var/lib/selinux/minimum/active/modules/100/ctdb
/var/lib/selinux/minimum/active/modules/100/ctdb/cil
/var/lib/selinux/minimum/active/modules/100/ctdb/hll
/var/lib/selinux/minimum/active/modules/100/ctdb/lang_ext
/var/lib/selinux/minimum/active/modules/100/cups
/var/lib/selinux/minimum/active/modules/100/cups/cil
/var/lib/selinux/minimum/active/modules/100/cups/hll
/var/lib/selinux/minimum/active/modules/100/cups/lang_ext
/var/lib/selinux/minimum/active/modules/100/cvs
/var/lib/selinux/minimum/active/modules/100/cvs/cil
/var/lib/selinux/minimum/active/modules/100/cvs/hll
/var/lib/selinux/minimum/active/modules/100/cvs/lang_ext
/var/lib/selinux/minimum/active/modules/100/cyphesis
/var/lib/selinux/minimum/active/modules/100/cyphesis/cil
/var/lib/selinux/minimum/active/modules/100/cyphesis/hll
/var/lib/selinux/minimum/active/modules/100/cyphesis/lang_ext
/var/lib/selinux/minimum/active/modules/100/cyrus
/var/lib/selinux/minimum/active/modules/100/cyrus/cil
/var/lib/selinux/minimum/active/modules/100/cyrus/hll
/var/lib/selinux/minimum/active/modules/100/cyrus/lang_ext
/var/lib/selinux/minimum/active/modules/100/daemontools
/var/lib/selinux/minimum/active/modules/100/daemontools/cil
/var/lib/selinux/minimum/active/modules/100/daemontools/hll
/var/lib/selinux/minimum/active/modules/100/daemontools/lang_ext
/var/lib/selinux/minimum/active/modules/100/dbadm
/var/lib/selinux/minimum/active/modules/100/dbadm/cil
/var/lib/selinux/minimum/active/modules/100/dbadm/hll
/var/lib/selinux/minimum/active/modules/100/dbadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/dbskk
/var/lib/selinux/minimum/active/modules/100/dbskk/cil
/var/lib/selinux/minimum/active/modules/100/dbskk/hll
/var/lib/selinux/minimum/active/modules/100/dbskk/lang_ext
/var/lib/selinux/minimum/active/modules/100/dbus
/var/lib/selinux/minimum/active/modules/100/dbus/cil
/var/lib/selinux/minimum/active/modules/100/dbus/hll
/var/lib/selinux/minimum/active/modules/100/dbus/lang_ext
/var/lib/selinux/minimum/active/modules/100/dcc
/var/lib/selinux/minimum/active/modules/100/dcc/cil
/var/lib/selinux/minimum/active/modules/100/dcc/hll
/var/lib/selinux/minimum/active/modules/100/dcc/lang_ext
/var/lib/selinux/minimum/active/modules/100/ddclient
/var/lib/selinux/minimum/active/modules/100/ddclient/cil
/var/lib/selinux/minimum/active/modules/100/ddclient/hll
/var/lib/selinux/minimum/active/modules/100/ddclient/lang_ext
/var/lib/selinux/minimum/active/modules/100/denyhosts
/var/lib/selinux/minimum/active/modules/100/denyhosts/cil
/var/lib/selinux/minimum/active/modules/100/denyhosts/hll
/var/lib/selinux/minimum/active/modules/100/denyhosts/lang_ext
/var/lib/selinux/minimum/active/modules/100/devicekit
/var/lib/selinux/minimum/active/modules/100/devicekit/cil
/var/lib/selinux/minimum/active/modules/100/devicekit/hll
/var/lib/selinux/minimum/active/modules/100/devicekit/lang_ext
/var/lib/selinux/minimum/active/modules/100/dhcp
/var/lib/selinux/minimum/active/modules/100/dhcp/cil
/var/lib/selinux/minimum/active/modules/100/dhcp/hll
/var/lib/selinux/minimum/active/modules/100/dhcp/lang_ext
/var/lib/selinux/minimum/active/modules/100/dictd
/var/lib/selinux/minimum/active/modules/100/dictd/cil
/var/lib/selinux/minimum/active/modules/100/dictd/hll
/var/lib/selinux/minimum/active/modules/100/dictd/lang_ext
/var/lib/selinux/minimum/active/modules/100/dirsrv
/var/lib/selinux/minimum/active/modules/100/dirsrv-admin
/var/lib/selinux/minimum/active/modules/100/dirsrv-admin/cil
/var/lib/selinux/minimum/active/modules/100/dirsrv-admin/hll
/var/lib/selinux/minimum/active/modules/100/dirsrv-admin/lang_ext
/var/lib/selinux/minimum/active/modules/100/dirsrv/cil
/var/lib/selinux/minimum/active/modules/100/dirsrv/hll
/var/lib/selinux/minimum/active/modules/100/dirsrv/lang_ext
/var/lib/selinux/minimum/active/modules/100/dmesg
/var/lib/selinux/minimum/active/modules/100/dmesg/cil
/var/lib/selinux/minimum/active/modules/100/dmesg/hll
/var/lib/selinux/minimum/active/modules/100/dmesg/lang_ext
/var/lib/selinux/minimum/active/modules/100/dmidecode
/var/lib/selinux/minimum/active/modules/100/dmidecode/cil
/var/lib/selinux/minimum/active/modules/100/dmidecode/hll
/var/lib/selinux/minimum/active/modules/100/dmidecode/lang_ext
/var/lib/selinux/minimum/active/modules/100/dnsmasq
/var/lib/selinux/minimum/active/modules/100/dnsmasq/cil
/var/lib/selinux/minimum/active/modules/100/dnsmasq/hll
/var/lib/selinux/minimum/active/modules/100/dnsmasq/lang_ext
/var/lib/selinux/minimum/active/modules/100/dnssec
/var/lib/selinux/minimum/active/modules/100/dnssec/cil
/var/lib/selinux/minimum/active/modules/100/dnssec/hll
/var/lib/selinux/minimum/active/modules/100/dnssec/lang_ext
/var/lib/selinux/minimum/active/modules/100/dovecot
/var/lib/selinux/minimum/active/modules/100/dovecot/cil
/var/lib/selinux/minimum/active/modules/100/dovecot/hll
/var/lib/selinux/minimum/active/modules/100/dovecot/lang_ext
/var/lib/selinux/minimum/active/modules/100/drbd
/var/lib/selinux/minimum/active/modules/100/drbd/cil
/var/lib/selinux/minimum/active/modules/100/drbd/hll
/var/lib/selinux/minimum/active/modules/100/drbd/lang_ext
/var/lib/selinux/minimum/active/modules/100/dspam
/var/lib/selinux/minimum/active/modules/100/dspam/cil
/var/lib/selinux/minimum/active/modules/100/dspam/hll
/var/lib/selinux/minimum/active/modules/100/dspam/lang_ext
/var/lib/selinux/minimum/active/modules/100/entropyd
/var/lib/selinux/minimum/active/modules/100/entropyd/cil
/var/lib/selinux/minimum/active/modules/100/entropyd/hll
/var/lib/selinux/minimum/active/modules/100/entropyd/lang_ext
/var/lib/selinux/minimum/active/modules/100/exim
/var/lib/selinux/minimum/active/modules/100/exim/cil
/var/lib/selinux/minimum/active/modules/100/exim/hll
/var/lib/selinux/minimum/active/modules/100/exim/lang_ext
/var/lib/selinux/minimum/active/modules/100/fail2ban
/var/lib/selinux/minimum/active/modules/100/fail2ban/cil
/var/lib/selinux/minimum/active/modules/100/fail2ban/hll
/var/lib/selinux/minimum/active/modules/100/fail2ban/lang_ext
/var/lib/selinux/minimum/active/modules/100/fcoe
/var/lib/selinux/minimum/active/modules/100/fcoe/cil
/var/lib/selinux/minimum/active/modules/100/fcoe/hll
/var/lib/selinux/minimum/active/modules/100/fcoe/lang_ext
/var/lib/selinux/minimum/active/modules/100/fetchmail
/var/lib/selinux/minimum/active/modules/100/fetchmail/cil
/var/lib/selinux/minimum/active/modules/100/fetchmail/hll
/var/lib/selinux/minimum/active/modules/100/fetchmail/lang_ext
/var/lib/selinux/minimum/active/modules/100/finger
/var/lib/selinux/minimum/active/modules/100/finger/cil
/var/lib/selinux/minimum/active/modules/100/finger/hll
/var/lib/selinux/minimum/active/modules/100/finger/lang_ext
/var/lib/selinux/minimum/active/modules/100/firewalld
/var/lib/selinux/minimum/active/modules/100/firewalld/cil
/var/lib/selinux/minimum/active/modules/100/firewalld/hll
/var/lib/selinux/minimum/active/modules/100/firewalld/lang_ext
/var/lib/selinux/minimum/active/modules/100/firewallgui
/var/lib/selinux/minimum/active/modules/100/firewallgui/cil
/var/lib/selinux/minimum/active/modules/100/firewallgui/hll
/var/lib/selinux/minimum/active/modules/100/firewallgui/lang_ext
/var/lib/selinux/minimum/active/modules/100/firstboot
/var/lib/selinux/minimum/active/modules/100/firstboot/cil
/var/lib/selinux/minimum/active/modules/100/firstboot/hll
/var/lib/selinux/minimum/active/modules/100/firstboot/lang_ext
/var/lib/selinux/minimum/active/modules/100/fprintd
/var/lib/selinux/minimum/active/modules/100/fprintd/cil
/var/lib/selinux/minimum/active/modules/100/fprintd/hll
/var/lib/selinux/minimum/active/modules/100/fprintd/lang_ext
/var/lib/selinux/minimum/active/modules/100/freeipmi
/var/lib/selinux/minimum/active/modules/100/freeipmi/cil
/var/lib/selinux/minimum/active/modules/100/freeipmi/hll
/var/lib/selinux/minimum/active/modules/100/freeipmi/lang_ext
/var/lib/selinux/minimum/active/modules/100/freqset
/var/lib/selinux/minimum/active/modules/100/freqset/cil
/var/lib/selinux/minimum/active/modules/100/freqset/hll
/var/lib/selinux/minimum/active/modules/100/freqset/lang_ext
/var/lib/selinux/minimum/active/modules/100/fstools
/var/lib/selinux/minimum/active/modules/100/fstools/cil
/var/lib/selinux/minimum/active/modules/100/fstools/hll
/var/lib/selinux/minimum/active/modules/100/fstools/lang_ext
/var/lib/selinux/minimum/active/modules/100/ftp
/var/lib/selinux/minimum/active/modules/100/ftp/cil
/var/lib/selinux/minimum/active/modules/100/ftp/hll
/var/lib/selinux/minimum/active/modules/100/ftp/lang_ext
/var/lib/selinux/minimum/active/modules/100/fwupd
/var/lib/selinux/minimum/active/modules/100/fwupd/cil
/var/lib/selinux/minimum/active/modules/100/fwupd/hll
/var/lib/selinux/minimum/active/modules/100/fwupd/lang_ext
/var/lib/selinux/minimum/active/modules/100/games
/var/lib/selinux/minimum/active/modules/100/games/cil
/var/lib/selinux/minimum/active/modules/100/games/hll
/var/lib/selinux/minimum/active/modules/100/games/lang_ext
/var/lib/selinux/minimum/active/modules/100/gdomap
/var/lib/selinux/minimum/active/modules/100/gdomap/cil
/var/lib/selinux/minimum/active/modules/100/gdomap/hll
/var/lib/selinux/minimum/active/modules/100/gdomap/lang_ext
/var/lib/selinux/minimum/active/modules/100/geoclue
/var/lib/selinux/minimum/active/modules/100/geoclue/cil
/var/lib/selinux/minimum/active/modules/100/geoclue/hll
/var/lib/selinux/minimum/active/modules/100/geoclue/lang_ext
/var/lib/selinux/minimum/active/modules/100/getty
/var/lib/selinux/minimum/active/modules/100/getty/cil
/var/lib/selinux/minimum/active/modules/100/getty/hll
/var/lib/selinux/minimum/active/modules/100/getty/lang_ext
/var/lib/selinux/minimum/active/modules/100/git
/var/lib/selinux/minimum/active/modules/100/git/cil
/var/lib/selinux/minimum/active/modules/100/git/hll
/var/lib/selinux/minimum/active/modules/100/git/lang_ext
/var/lib/selinux/minimum/active/modules/100/gitosis
/var/lib/selinux/minimum/active/modules/100/gitosis/cil
/var/lib/selinux/minimum/active/modules/100/gitosis/hll
/var/lib/selinux/minimum/active/modules/100/gitosis/lang_ext
/var/lib/selinux/minimum/active/modules/100/glance
/var/lib/selinux/minimum/active/modules/100/glance/cil
/var/lib/selinux/minimum/active/modules/100/glance/hll
/var/lib/selinux/minimum/active/modules/100/glance/lang_ext
/var/lib/selinux/minimum/active/modules/100/glusterd
/var/lib/selinux/minimum/active/modules/100/glusterd/cil
/var/lib/selinux/minimum/active/modules/100/glusterd/hll
/var/lib/selinux/minimum/active/modules/100/glusterd/lang_ext
/var/lib/selinux/minimum/active/modules/100/gnome
/var/lib/selinux/minimum/active/modules/100/gnome/cil
/var/lib/selinux/minimum/active/modules/100/gnome/hll
/var/lib/selinux/minimum/active/modules/100/gnome/lang_ext
/var/lib/selinux/minimum/active/modules/100/gpg
/var/lib/selinux/minimum/active/modules/100/gpg/cil
/var/lib/selinux/minimum/active/modules/100/gpg/hll
/var/lib/selinux/minimum/active/modules/100/gpg/lang_ext
/var/lib/selinux/minimum/active/modules/100/gpm
/var/lib/selinux/minimum/active/modules/100/gpm/cil
/var/lib/selinux/minimum/active/modules/100/gpm/hll
/var/lib/selinux/minimum/active/modules/100/gpm/lang_ext
/var/lib/selinux/minimum/active/modules/100/gpsd
/var/lib/selinux/minimum/active/modules/100/gpsd/cil
/var/lib/selinux/minimum/active/modules/100/gpsd/hll
/var/lib/selinux/minimum/active/modules/100/gpsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/gssproxy
/var/lib/selinux/minimum/active/modules/100/gssproxy/cil
/var/lib/selinux/minimum/active/modules/100/gssproxy/hll
/var/lib/selinux/minimum/active/modules/100/gssproxy/lang_ext
/var/lib/selinux/minimum/active/modules/100/guest
/var/lib/selinux/minimum/active/modules/100/guest/cil
/var/lib/selinux/minimum/active/modules/100/guest/hll
/var/lib/selinux/minimum/active/modules/100/guest/lang_ext
/var/lib/selinux/minimum/active/modules/100/hddtemp
/var/lib/selinux/minimum/active/modules/100/hddtemp/cil
/var/lib/selinux/minimum/active/modules/100/hddtemp/hll
/var/lib/selinux/minimum/active/modules/100/hddtemp/lang_ext
/var/lib/selinux/minimum/active/modules/100/hostapd
/var/lib/selinux/minimum/active/modules/100/hostapd/cil
/var/lib/selinux/minimum/active/modules/100/hostapd/hll
/var/lib/selinux/minimum/active/modules/100/hostapd/lang_ext
/var/lib/selinux/minimum/active/modules/100/hostname
/var/lib/selinux/minimum/active/modules/100/hostname/cil
/var/lib/selinux/minimum/active/modules/100/hostname/hll
/var/lib/selinux/minimum/active/modules/100/hostname/lang_ext
/var/lib/selinux/minimum/active/modules/100/hsqldb
/var/lib/selinux/minimum/active/modules/100/hsqldb/cil
/var/lib/selinux/minimum/active/modules/100/hsqldb/hll
/var/lib/selinux/minimum/active/modules/100/hsqldb/lang_ext
/var/lib/selinux/minimum/active/modules/100/hwloc
/var/lib/selinux/minimum/active/modules/100/hwloc/cil
/var/lib/selinux/minimum/active/modules/100/hwloc/hll
/var/lib/selinux/minimum/active/modules/100/hwloc/lang_ext
/var/lib/selinux/minimum/active/modules/100/hypervkvp
/var/lib/selinux/minimum/active/modules/100/hypervkvp/cil
/var/lib/selinux/minimum/active/modules/100/hypervkvp/hll
/var/lib/selinux/minimum/active/modules/100/hypervkvp/lang_ext
/var/lib/selinux/minimum/active/modules/100/ibacm
/var/lib/selinux/minimum/active/modules/100/ibacm/cil
/var/lib/selinux/minimum/active/modules/100/ibacm/hll
/var/lib/selinux/minimum/active/modules/100/ibacm/lang_ext
/var/lib/selinux/minimum/active/modules/100/ica
/var/lib/selinux/minimum/active/modules/100/ica/cil
/var/lib/selinux/minimum/active/modules/100/ica/hll
/var/lib/selinux/minimum/active/modules/100/ica/lang_ext
/var/lib/selinux/minimum/active/modules/100/icecast
/var/lib/selinux/minimum/active/modules/100/icecast/cil
/var/lib/selinux/minimum/active/modules/100/icecast/hll
/var/lib/selinux/minimum/active/modules/100/icecast/lang_ext
/var/lib/selinux/minimum/active/modules/100/inetd
/var/lib/selinux/minimum/active/modules/100/inetd/cil
/var/lib/selinux/minimum/active/modules/100/inetd/hll
/var/lib/selinux/minimum/active/modules/100/inetd/lang_ext
/var/lib/selinux/minimum/active/modules/100/init
/var/lib/selinux/minimum/active/modules/100/init/cil
/var/lib/selinux/minimum/active/modules/100/init/hll
/var/lib/selinux/minimum/active/modules/100/init/lang_ext
/var/lib/selinux/minimum/active/modules/100/inn
/var/lib/selinux/minimum/active/modules/100/inn/cil
/var/lib/selinux/minimum/active/modules/100/inn/hll
/var/lib/selinux/minimum/active/modules/100/inn/lang_ext
/var/lib/selinux/minimum/active/modules/100/iodine
/var/lib/selinux/minimum/active/modules/100/iodine/cil
/var/lib/selinux/minimum/active/modules/100/iodine/hll
/var/lib/selinux/minimum/active/modules/100/iodine/lang_ext
/var/lib/selinux/minimum/active/modules/100/iotop
/var/lib/selinux/minimum/active/modules/100/iotop/cil
/var/lib/selinux/minimum/active/modules/100/iotop/hll
/var/lib/selinux/minimum/active/modules/100/iotop/lang_ext
/var/lib/selinux/minimum/active/modules/100/ipa
/var/lib/selinux/minimum/active/modules/100/ipa/cil
/var/lib/selinux/minimum/active/modules/100/ipa/hll
/var/lib/selinux/minimum/active/modules/100/ipa/lang_ext
/var/lib/selinux/minimum/active/modules/100/ipmievd
/var/lib/selinux/minimum/active/modules/100/ipmievd/cil
/var/lib/selinux/minimum/active/modules/100/ipmievd/hll
/var/lib/selinux/minimum/active/modules/100/ipmievd/lang_ext
/var/lib/selinux/minimum/active/modules/100/ipsec
/var/lib/selinux/minimum/active/modules/100/ipsec/cil
/var/lib/selinux/minimum/active/modules/100/ipsec/hll
/var/lib/selinux/minimum/active/modules/100/ipsec/lang_ext
/var/lib/selinux/minimum/active/modules/100/iptables
/var/lib/selinux/minimum/active/modules/100/iptables/cil
/var/lib/selinux/minimum/active/modules/100/iptables/hll
/var/lib/selinux/minimum/active/modules/100/iptables/lang_ext
/var/lib/selinux/minimum/active/modules/100/irc
/var/lib/selinux/minimum/active/modules/100/irc/cil
/var/lib/selinux/minimum/active/modules/100/irc/hll
/var/lib/selinux/minimum/active/modules/100/irc/lang_ext
/var/lib/selinux/minimum/active/modules/100/irqbalance
/var/lib/selinux/minimum/active/modules/100/irqbalance/cil
/var/lib/selinux/minimum/active/modules/100/irqbalance/hll
/var/lib/selinux/minimum/active/modules/100/irqbalance/lang_ext
/var/lib/selinux/minimum/active/modules/100/iscsi
/var/lib/selinux/minimum/active/modules/100/iscsi/cil
/var/lib/selinux/minimum/active/modules/100/iscsi/hll
/var/lib/selinux/minimum/active/modules/100/iscsi/lang_ext
/var/lib/selinux/minimum/active/modules/100/isns
/var/lib/selinux/minimum/active/modules/100/isns/cil
/var/lib/selinux/minimum/active/modules/100/isns/hll
/var/lib/selinux/minimum/active/modules/100/isns/lang_ext
/var/lib/selinux/minimum/active/modules/100/jabber
/var/lib/selinux/minimum/active/modules/100/jabber/cil
/var/lib/selinux/minimum/active/modules/100/jabber/hll
/var/lib/selinux/minimum/active/modules/100/jabber/lang_ext
/var/lib/selinux/minimum/active/modules/100/jetty
/var/lib/selinux/minimum/active/modules/100/jetty/cil
/var/lib/selinux/minimum/active/modules/100/jetty/hll
/var/lib/selinux/minimum/active/modules/100/jetty/lang_ext
/var/lib/selinux/minimum/active/modules/100/jockey
/var/lib/selinux/minimum/active/modules/100/jockey/cil
/var/lib/selinux/minimum/active/modules/100/jockey/hll
/var/lib/selinux/minimum/active/modules/100/jockey/lang_ext
/var/lib/selinux/minimum/active/modules/100/journalctl
/var/lib/selinux/minimum/active/modules/100/journalctl/cil
/var/lib/selinux/minimum/active/modules/100/journalctl/hll
/var/lib/selinux/minimum/active/modules/100/journalctl/lang_ext
/var/lib/selinux/minimum/active/modules/100/kdump
/var/lib/selinux/minimum/active/modules/100/kdump/cil
/var/lib/selinux/minimum/active/modules/100/kdump/hll
/var/lib/selinux/minimum/active/modules/100/kdump/lang_ext
/var/lib/selinux/minimum/active/modules/100/kdumpgui
/var/lib/selinux/minimum/active/modules/100/kdumpgui/cil
/var/lib/selinux/minimum/active/modules/100/kdumpgui/hll
/var/lib/selinux/minimum/active/modules/100/kdumpgui/lang_ext
/var/lib/selinux/minimum/active/modules/100/keepalived
/var/lib/selinux/minimum/active/modules/100/keepalived/cil
/var/lib/selinux/minimum/active/modules/100/keepalived/hll
/var/lib/selinux/minimum/active/modules/100/keepalived/lang_ext
/var/lib/selinux/minimum/active/modules/100/kerberos
/var/lib/selinux/minimum/active/modules/100/kerberos/cil
/var/lib/selinux/minimum/active/modules/100/kerberos/hll
/var/lib/selinux/minimum/active/modules/100/kerberos/lang_ext
/var/lib/selinux/minimum/active/modules/100/keyboardd
/var/lib/selinux/minimum/active/modules/100/keyboardd/cil
/var/lib/selinux/minimum/active/modules/100/keyboardd/hll
/var/lib/selinux/minimum/active/modules/100/keyboardd/lang_ext
/var/lib/selinux/minimum/active/modules/100/keystone
/var/lib/selinux/minimum/active/modules/100/keystone/cil
/var/lib/selinux/minimum/active/modules/100/keystone/hll
/var/lib/selinux/minimum/active/modules/100/keystone/lang_ext
/var/lib/selinux/minimum/active/modules/100/kismet
/var/lib/selinux/minimum/active/modules/100/kismet/cil
/var/lib/selinux/minimum/active/modules/100/kismet/hll
/var/lib/selinux/minimum/active/modules/100/kismet/lang_ext
/var/lib/selinux/minimum/active/modules/100/kmscon
/var/lib/selinux/minimum/active/modules/100/kmscon/cil
/var/lib/selinux/minimum/active/modules/100/kmscon/hll
/var/lib/selinux/minimum/active/modules/100/kmscon/lang_ext
/var/lib/selinux/minimum/active/modules/100/kpatch
/var/lib/selinux/minimum/active/modules/100/kpatch/cil
/var/lib/selinux/minimum/active/modules/100/kpatch/hll
/var/lib/selinux/minimum/active/modules/100/kpatch/lang_ext
/var/lib/selinux/minimum/active/modules/100/ksmtuned
/var/lib/selinux/minimum/active/modules/100/ksmtuned/cil
/var/lib/selinux/minimum/active/modules/100/ksmtuned/hll
/var/lib/selinux/minimum/active/modules/100/ksmtuned/lang_ext
/var/lib/selinux/minimum/active/modules/100/ktalk
/var/lib/selinux/minimum/active/modules/100/ktalk/cil
/var/lib/selinux/minimum/active/modules/100/ktalk/hll
/var/lib/selinux/minimum/active/modules/100/ktalk/lang_ext
/var/lib/selinux/minimum/active/modules/100/l2tp
/var/lib/selinux/minimum/active/modules/100/l2tp/cil
/var/lib/selinux/minimum/active/modules/100/l2tp/hll
/var/lib/selinux/minimum/active/modules/100/l2tp/lang_ext
/var/lib/selinux/minimum/active/modules/100/ldap
/var/lib/selinux/minimum/active/modules/100/ldap/cil
/var/lib/selinux/minimum/active/modules/100/ldap/hll
/var/lib/selinux/minimum/active/modules/100/ldap/lang_ext
/var/lib/selinux/minimum/active/modules/100/libraries
/var/lib/selinux/minimum/active/modules/100/libraries/cil
/var/lib/selinux/minimum/active/modules/100/libraries/hll
/var/lib/selinux/minimum/active/modules/100/libraries/lang_ext
/var/lib/selinux/minimum/active/modules/100/likewise
/var/lib/selinux/minimum/active/modules/100/likewise/cil
/var/lib/selinux/minimum/active/modules/100/likewise/hll
/var/lib/selinux/minimum/active/modules/100/likewise/lang_ext
/var/lib/selinux/minimum/active/modules/100/linuxptp
/var/lib/selinux/minimum/active/modules/100/linuxptp/cil
/var/lib/selinux/minimum/active/modules/100/linuxptp/hll
/var/lib/selinux/minimum/active/modules/100/linuxptp/lang_ext
/var/lib/selinux/minimum/active/modules/100/lircd
/var/lib/selinux/minimum/active/modules/100/lircd/cil
/var/lib/selinux/minimum/active/modules/100/lircd/hll
/var/lib/selinux/minimum/active/modules/100/lircd/lang_ext
/var/lib/selinux/minimum/active/modules/100/livecd
/var/lib/selinux/minimum/active/modules/100/livecd/cil
/var/lib/selinux/minimum/active/modules/100/livecd/hll
/var/lib/selinux/minimum/active/modules/100/livecd/lang_ext
/var/lib/selinux/minimum/active/modules/100/lldpad
/var/lib/selinux/minimum/active/modules/100/lldpad/cil
/var/lib/selinux/minimum/active/modules/100/lldpad/hll
/var/lib/selinux/minimum/active/modules/100/lldpad/lang_ext
/var/lib/selinux/minimum/active/modules/100/loadkeys
/var/lib/selinux/minimum/active/modules/100/loadkeys/cil
/var/lib/selinux/minimum/active/modules/100/loadkeys/hll
/var/lib/selinux/minimum/active/modules/100/loadkeys/lang_ext
/var/lib/selinux/minimum/active/modules/100/locallogin
/var/lib/selinux/minimum/active/modules/100/locallogin/cil
/var/lib/selinux/minimum/active/modules/100/locallogin/hll
/var/lib/selinux/minimum/active/modules/100/locallogin/lang_ext
/var/lib/selinux/minimum/active/modules/100/lockdev
/var/lib/selinux/minimum/active/modules/100/lockdev/cil
/var/lib/selinux/minimum/active/modules/100/lockdev/hll
/var/lib/selinux/minimum/active/modules/100/lockdev/lang_ext
/var/lib/selinux/minimum/active/modules/100/logadm
/var/lib/selinux/minimum/active/modules/100/logadm/cil
/var/lib/selinux/minimum/active/modules/100/logadm/hll
/var/lib/selinux/minimum/active/modules/100/logadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/logging
/var/lib/selinux/minimum/active/modules/100/logging/cil
/var/lib/selinux/minimum/active/modules/100/logging/hll
/var/lib/selinux/minimum/active/modules/100/logging/lang_ext
/var/lib/selinux/minimum/active/modules/100/logrotate
/var/lib/selinux/minimum/active/modules/100/logrotate/cil
/var/lib/selinux/minimum/active/modules/100/logrotate/hll
/var/lib/selinux/minimum/active/modules/100/logrotate/lang_ext
/var/lib/selinux/minimum/active/modules/100/logwatch
/var/lib/selinux/minimum/active/modules/100/logwatch/cil
/var/lib/selinux/minimum/active/modules/100/logwatch/hll
/var/lib/selinux/minimum/active/modules/100/logwatch/lang_ext
/var/lib/selinux/minimum/active/modules/100/lpd
/var/lib/selinux/minimum/active/modules/100/lpd/cil
/var/lib/selinux/minimum/active/modules/100/lpd/hll
/var/lib/selinux/minimum/active/modules/100/lpd/lang_ext
/var/lib/selinux/minimum/active/modules/100/lsm
/var/lib/selinux/minimum/active/modules/100/lsm/cil
/var/lib/selinux/minimum/active/modules/100/lsm/hll
/var/lib/selinux/minimum/active/modules/100/lsm/lang_ext
/var/lib/selinux/minimum/active/modules/100/lttng-tools
/var/lib/selinux/minimum/active/modules/100/lttng-tools/cil
/var/lib/selinux/minimum/active/modules/100/lttng-tools/hll
/var/lib/selinux/minimum/active/modules/100/lttng-tools/lang_ext
/var/lib/selinux/minimum/active/modules/100/lvm
/var/lib/selinux/minimum/active/modules/100/lvm/cil
/var/lib/selinux/minimum/active/modules/100/lvm/hll
/var/lib/selinux/minimum/active/modules/100/lvm/lang_ext
/var/lib/selinux/minimum/active/modules/100/mailman
/var/lib/selinux/minimum/active/modules/100/mailman/cil
/var/lib/selinux/minimum/active/modules/100/mailman/hll
/var/lib/selinux/minimum/active/modules/100/mailman/lang_ext
/var/lib/selinux/minimum/active/modules/100/mailscanner
/var/lib/selinux/minimum/active/modules/100/mailscanner/cil
/var/lib/selinux/minimum/active/modules/100/mailscanner/hll
/var/lib/selinux/minimum/active/modules/100/mailscanner/lang_ext
/var/lib/selinux/minimum/active/modules/100/man2html
/var/lib/selinux/minimum/active/modules/100/man2html/cil
/var/lib/selinux/minimum/active/modules/100/man2html/hll
/var/lib/selinux/minimum/active/modules/100/man2html/lang_ext
/var/lib/selinux/minimum/active/modules/100/mandb
/var/lib/selinux/minimum/active/modules/100/mandb/cil
/var/lib/selinux/minimum/active/modules/100/mandb/hll
/var/lib/selinux/minimum/active/modules/100/mandb/lang_ext
/var/lib/selinux/minimum/active/modules/100/mcelog
/var/lib/selinux/minimum/active/modules/100/mcelog/cil
/var/lib/selinux/minimum/active/modules/100/mcelog/hll
/var/lib/selinux/minimum/active/modules/100/mcelog/lang_ext
/var/lib/selinux/minimum/active/modules/100/mediawiki
/var/lib/selinux/minimum/active/modules/100/mediawiki/cil
/var/lib/selinux/minimum/active/modules/100/mediawiki/hll
/var/lib/selinux/minimum/active/modules/100/mediawiki/lang_ext
/var/lib/selinux/minimum/active/modules/100/memcached
/var/lib/selinux/minimum/active/modules/100/memcached/cil
/var/lib/selinux/minimum/active/modules/100/memcached/hll
/var/lib/selinux/minimum/active/modules/100/memcached/lang_ext
/var/lib/selinux/minimum/active/modules/100/milter
/var/lib/selinux/minimum/active/modules/100/milter/cil
/var/lib/selinux/minimum/active/modules/100/milter/hll
/var/lib/selinux/minimum/active/modules/100/milter/lang_ext
/var/lib/selinux/minimum/active/modules/100/minidlna
/var/lib/selinux/minimum/active/modules/100/minidlna/cil
/var/lib/selinux/minimum/active/modules/100/minidlna/hll
/var/lib/selinux/minimum/active/modules/100/minidlna/lang_ext
/var/lib/selinux/minimum/active/modules/100/minissdpd
/var/lib/selinux/minimum/active/modules/100/minissdpd/cil
/var/lib/selinux/minimum/active/modules/100/minissdpd/hll
/var/lib/selinux/minimum/active/modules/100/minissdpd/lang_ext
/var/lib/selinux/minimum/active/modules/100/mip6d
/var/lib/selinux/minimum/active/modules/100/mip6d/cil
/var/lib/selinux/minimum/active/modules/100/mip6d/hll
/var/lib/selinux/minimum/active/modules/100/mip6d/lang_ext
/var/lib/selinux/minimum/active/modules/100/mirrormanager
/var/lib/selinux/minimum/active/modules/100/mirrormanager/cil
/var/lib/selinux/minimum/active/modules/100/mirrormanager/hll
/var/lib/selinux/minimum/active/modules/100/mirrormanager/lang_ext
/var/lib/selinux/minimum/active/modules/100/miscfiles
/var/lib/selinux/minimum/active/modules/100/miscfiles/cil
/var/lib/selinux/minimum/active/modules/100/miscfiles/hll
/var/lib/selinux/minimum/active/modules/100/miscfiles/lang_ext
/var/lib/selinux/minimum/active/modules/100/mock
/var/lib/selinux/minimum/active/modules/100/mock/cil
/var/lib/selinux/minimum/active/modules/100/mock/hll
/var/lib/selinux/minimum/active/modules/100/mock/lang_ext
/var/lib/selinux/minimum/active/modules/100/modemmanager
/var/lib/selinux/minimum/active/modules/100/modemmanager/cil
/var/lib/selinux/minimum/active/modules/100/modemmanager/hll
/var/lib/selinux/minimum/active/modules/100/modemmanager/lang_ext
/var/lib/selinux/minimum/active/modules/100/modutils
/var/lib/selinux/minimum/active/modules/100/modutils/cil
/var/lib/selinux/minimum/active/modules/100/modutils/hll
/var/lib/selinux/minimum/active/modules/100/modutils/lang_ext
/var/lib/selinux/minimum/active/modules/100/mojomojo
/var/lib/selinux/minimum/active/modules/100/mojomojo/cil
/var/lib/selinux/minimum/active/modules/100/mojomojo/hll
/var/lib/selinux/minimum/active/modules/100/mojomojo/lang_ext
/var/lib/selinux/minimum/active/modules/100/mon_statd
/var/lib/selinux/minimum/active/modules/100/mon_statd/cil
/var/lib/selinux/minimum/active/modules/100/mon_statd/hll
/var/lib/selinux/minimum/active/modules/100/mon_statd/lang_ext
/var/lib/selinux/minimum/active/modules/100/mongodb
/var/lib/selinux/minimum/active/modules/100/mongodb/cil
/var/lib/selinux/minimum/active/modules/100/mongodb/hll
/var/lib/selinux/minimum/active/modules/100/mongodb/lang_ext
/var/lib/selinux/minimum/active/modules/100/motion
/var/lib/selinux/minimum/active/modules/100/motion/cil
/var/lib/selinux/minimum/active/modules/100/motion/hll
/var/lib/selinux/minimum/active/modules/100/motion/lang_ext
/var/lib/selinux/minimum/active/modules/100/mount
/var/lib/selinux/minimum/active/modules/100/mount/cil
/var/lib/selinux/minimum/active/modules/100/mount/hll
/var/lib/selinux/minimum/active/modules/100/mount/lang_ext
/var/lib/selinux/minimum/active/modules/100/mozilla
/var/lib/selinux/minimum/active/modules/100/mozilla/cil
/var/lib/selinux/minimum/active/modules/100/mozilla/hll
/var/lib/selinux/minimum/active/modules/100/mozilla/lang_ext
/var/lib/selinux/minimum/active/modules/100/mpd
/var/lib/selinux/minimum/active/modules/100/mpd/cil
/var/lib/selinux/minimum/active/modules/100/mpd/hll
/var/lib/selinux/minimum/active/modules/100/mpd/lang_ext
/var/lib/selinux/minimum/active/modules/100/mplayer
/var/lib/selinux/minimum/active/modules/100/mplayer/cil
/var/lib/selinux/minimum/active/modules/100/mplayer/hll
/var/lib/selinux/minimum/active/modules/100/mplayer/lang_ext
/var/lib/selinux/minimum/active/modules/100/mrtg
/var/lib/selinux/minimum/active/modules/100/mrtg/cil
/var/lib/selinux/minimum/active/modules/100/mrtg/hll
/var/lib/selinux/minimum/active/modules/100/mrtg/lang_ext
/var/lib/selinux/minimum/active/modules/100/mta
/var/lib/selinux/minimum/active/modules/100/mta/cil
/var/lib/selinux/minimum/active/modules/100/mta/hll
/var/lib/selinux/minimum/active/modules/100/mta/lang_ext
/var/lib/selinux/minimum/active/modules/100/munin
/var/lib/selinux/minimum/active/modules/100/munin/cil
/var/lib/selinux/minimum/active/modules/100/munin/hll
/var/lib/selinux/minimum/active/modules/100/munin/lang_ext
/var/lib/selinux/minimum/active/modules/100/mysql
/var/lib/selinux/minimum/active/modules/100/mysql/cil
/var/lib/selinux/minimum/active/modules/100/mysql/hll
/var/lib/selinux/minimum/active/modules/100/mysql/lang_ext
/var/lib/selinux/minimum/active/modules/100/mythtv
/var/lib/selinux/minimum/active/modules/100/mythtv/cil
/var/lib/selinux/minimum/active/modules/100/mythtv/hll
/var/lib/selinux/minimum/active/modules/100/mythtv/lang_ext
/var/lib/selinux/minimum/active/modules/100/naemon
/var/lib/selinux/minimum/active/modules/100/naemon/cil
/var/lib/selinux/minimum/active/modules/100/naemon/hll
/var/lib/selinux/minimum/active/modules/100/naemon/lang_ext
/var/lib/selinux/minimum/active/modules/100/nagios
/var/lib/selinux/minimum/active/modules/100/nagios/cil
/var/lib/selinux/minimum/active/modules/100/nagios/hll
/var/lib/selinux/minimum/active/modules/100/nagios/lang_ext
/var/lib/selinux/minimum/active/modules/100/namespace
/var/lib/selinux/minimum/active/modules/100/namespace/cil
/var/lib/selinux/minimum/active/modules/100/namespace/hll
/var/lib/selinux/minimum/active/modules/100/namespace/lang_ext
/var/lib/selinux/minimum/active/modules/100/ncftool
/var/lib/selinux/minimum/active/modules/100/ncftool/cil
/var/lib/selinux/minimum/active/modules/100/ncftool/hll
/var/lib/selinux/minimum/active/modules/100/ncftool/lang_ext
/var/lib/selinux/minimum/active/modules/100/netlabel
/var/lib/selinux/minimum/active/modules/100/netlabel/cil
/var/lib/selinux/minimum/active/modules/100/netlabel/hll
/var/lib/selinux/minimum/active/modules/100/netlabel/lang_ext
/var/lib/selinux/minimum/active/modules/100/netutils
/var/lib/selinux/minimum/active/modules/100/netutils/cil
/var/lib/selinux/minimum/active/modules/100/netutils/hll
/var/lib/selinux/minimum/active/modules/100/netutils/lang_ext
/var/lib/selinux/minimum/active/modules/100/networkmanager
/var/lib/selinux/minimum/active/modules/100/networkmanager/cil
/var/lib/selinux/minimum/active/modules/100/networkmanager/hll
/var/lib/selinux/minimum/active/modules/100/networkmanager/lang_ext
/var/lib/selinux/minimum/active/modules/100/ninfod
/var/lib/selinux/minimum/active/modules/100/ninfod/cil
/var/lib/selinux/minimum/active/modules/100/ninfod/hll
/var/lib/selinux/minimum/active/modules/100/ninfod/lang_ext
/var/lib/selinux/minimum/active/modules/100/nis
/var/lib/selinux/minimum/active/modules/100/nis/cil
/var/lib/selinux/minimum/active/modules/100/nis/hll
/var/lib/selinux/minimum/active/modules/100/nis/lang_ext
/var/lib/selinux/minimum/active/modules/100/nova
/var/lib/selinux/minimum/active/modules/100/nova/cil
/var/lib/selinux/minimum/active/modules/100/nova/hll
/var/lib/selinux/minimum/active/modules/100/nova/lang_ext
/var/lib/selinux/minimum/active/modules/100/nscd
/var/lib/selinux/minimum/active/modules/100/nscd/cil
/var/lib/selinux/minimum/active/modules/100/nscd/hll
/var/lib/selinux/minimum/active/modules/100/nscd/lang_ext
/var/lib/selinux/minimum/active/modules/100/nsd
/var/lib/selinux/minimum/active/modules/100/nsd/cil
/var/lib/selinux/minimum/active/modules/100/nsd/hll
/var/lib/selinux/minimum/active/modules/100/nsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/nslcd
/var/lib/selinux/minimum/active/modules/100/nslcd/cil
/var/lib/selinux/minimum/active/modules/100/nslcd/hll
/var/lib/selinux/minimum/active/modules/100/nslcd/lang_ext
/var/lib/selinux/minimum/active/modules/100/ntop
/var/lib/selinux/minimum/active/modules/100/ntop/cil
/var/lib/selinux/minimum/active/modules/100/ntop/hll
/var/lib/selinux/minimum/active/modules/100/ntop/lang_ext
/var/lib/selinux/minimum/active/modules/100/ntp
/var/lib/selinux/minimum/active/modules/100/ntp/cil
/var/lib/selinux/minimum/active/modules/100/ntp/hll
/var/lib/selinux/minimum/active/modules/100/ntp/lang_ext
/var/lib/selinux/minimum/active/modules/100/numad
/var/lib/selinux/minimum/active/modules/100/numad/cil
/var/lib/selinux/minimum/active/modules/100/numad/hll
/var/lib/selinux/minimum/active/modules/100/numad/lang_ext
/var/lib/selinux/minimum/active/modules/100/nut
/var/lib/selinux/minimum/active/modules/100/nut/cil
/var/lib/selinux/minimum/active/modules/100/nut/hll
/var/lib/selinux/minimum/active/modules/100/nut/lang_ext
/var/lib/selinux/minimum/active/modules/100/nx
/var/lib/selinux/minimum/active/modules/100/nx/cil
/var/lib/selinux/minimum/active/modules/100/nx/hll
/var/lib/selinux/minimum/active/modules/100/nx/lang_ext
/var/lib/selinux/minimum/active/modules/100/obex
/var/lib/selinux/minimum/active/modules/100/obex/cil
/var/lib/selinux/minimum/active/modules/100/obex/hll
/var/lib/selinux/minimum/active/modules/100/obex/lang_ext
/var/lib/selinux/minimum/active/modules/100/oddjob
/var/lib/selinux/minimum/active/modules/100/oddjob/cil
/var/lib/selinux/minimum/active/modules/100/oddjob/hll
/var/lib/selinux/minimum/active/modules/100/oddjob/lang_ext
/var/lib/selinux/minimum/active/modules/100/opafm
/var/lib/selinux/minimum/active/modules/100/opafm/cil
/var/lib/selinux/minimum/active/modules/100/opafm/hll
/var/lib/selinux/minimum/active/modules/100/opafm/lang_ext
/var/lib/selinux/minimum/active/modules/100/openct
/var/lib/selinux/minimum/active/modules/100/openct/cil
/var/lib/selinux/minimum/active/modules/100/openct/hll
/var/lib/selinux/minimum/active/modules/100/openct/lang_ext
/var/lib/selinux/minimum/active/modules/100/opendnssec
/var/lib/selinux/minimum/active/modules/100/opendnssec/cil
/var/lib/selinux/minimum/active/modules/100/opendnssec/hll
/var/lib/selinux/minimum/active/modules/100/opendnssec/lang_ext
/var/lib/selinux/minimum/active/modules/100/openfortivpn
/var/lib/selinux/minimum/active/modules/100/openfortivpn/cil
/var/lib/selinux/minimum/active/modules/100/openfortivpn/hll
/var/lib/selinux/minimum/active/modules/100/openfortivpn/lang_ext
/var/lib/selinux/minimum/active/modules/100/openhpid
/var/lib/selinux/minimum/active/modules/100/openhpid/cil
/var/lib/selinux/minimum/active/modules/100/openhpid/hll
/var/lib/selinux/minimum/active/modules/100/openhpid/lang_ext
/var/lib/selinux/minimum/active/modules/100/openshift
/var/lib/selinux/minimum/active/modules/100/openshift-origin
/var/lib/selinux/minimum/active/modules/100/openshift-origin/cil
/var/lib/selinux/minimum/active/modules/100/openshift-origin/hll
/var/lib/selinux/minimum/active/modules/100/openshift-origin/lang_ext
/var/lib/selinux/minimum/active/modules/100/openshift/cil
/var/lib/selinux/minimum/active/modules/100/openshift/hll
/var/lib/selinux/minimum/active/modules/100/openshift/lang_ext
/var/lib/selinux/minimum/active/modules/100/opensm
/var/lib/selinux/minimum/active/modules/100/opensm/cil
/var/lib/selinux/minimum/active/modules/100/opensm/hll
/var/lib/selinux/minimum/active/modules/100/opensm/lang_ext
/var/lib/selinux/minimum/active/modules/100/openvpn
/var/lib/selinux/minimum/active/modules/100/openvpn/cil
/var/lib/selinux/minimum/active/modules/100/openvpn/hll
/var/lib/selinux/minimum/active/modules/100/openvpn/lang_ext
/var/lib/selinux/minimum/active/modules/100/openvswitch
/var/lib/selinux/minimum/active/modules/100/openvswitch/cil
/var/lib/selinux/minimum/active/modules/100/openvswitch/hll
/var/lib/selinux/minimum/active/modules/100/openvswitch/lang_ext
/var/lib/selinux/minimum/active/modules/100/openwsman
/var/lib/selinux/minimum/active/modules/100/openwsman/cil
/var/lib/selinux/minimum/active/modules/100/openwsman/hll
/var/lib/selinux/minimum/active/modules/100/openwsman/lang_ext
/var/lib/selinux/minimum/active/modules/100/oracleasm
/var/lib/selinux/minimum/active/modules/100/oracleasm/cil
/var/lib/selinux/minimum/active/modules/100/oracleasm/hll
/var/lib/selinux/minimum/active/modules/100/oracleasm/lang_ext
/var/lib/selinux/minimum/active/modules/100/osad
/var/lib/selinux/minimum/active/modules/100/osad/cil
/var/lib/selinux/minimum/active/modules/100/osad/hll
/var/lib/selinux/minimum/active/modules/100/osad/lang_ext
/var/lib/selinux/minimum/active/modules/100/pads
/var/lib/selinux/minimum/active/modules/100/pads/cil
/var/lib/selinux/minimum/active/modules/100/pads/hll
/var/lib/selinux/minimum/active/modules/100/pads/lang_ext
/var/lib/selinux/minimum/active/modules/100/passenger
/var/lib/selinux/minimum/active/modules/100/passenger/cil
/var/lib/selinux/minimum/active/modules/100/passenger/hll
/var/lib/selinux/minimum/active/modules/100/passenger/lang_ext
/var/lib/selinux/minimum/active/modules/100/pcmcia
/var/lib/selinux/minimum/active/modules/100/pcmcia/cil
/var/lib/selinux/minimum/active/modules/100/pcmcia/hll
/var/lib/selinux/minimum/active/modules/100/pcmcia/lang_ext
/var/lib/selinux/minimum/active/modules/100/pcp
/var/lib/selinux/minimum/active/modules/100/pcp/cil
/var/lib/selinux/minimum/active/modules/100/pcp/hll
/var/lib/selinux/minimum/active/modules/100/pcp/lang_ext
/var/lib/selinux/minimum/active/modules/100/pcscd
/var/lib/selinux/minimum/active/modules/100/pcscd/cil
/var/lib/selinux/minimum/active/modules/100/pcscd/hll
/var/lib/selinux/minimum/active/modules/100/pcscd/lang_ext
/var/lib/selinux/minimum/active/modules/100/pdns
/var/lib/selinux/minimum/active/modules/100/pdns/cil
/var/lib/selinux/minimum/active/modules/100/pdns/hll
/var/lib/selinux/minimum/active/modules/100/pdns/lang_ext
/var/lib/selinux/minimum/active/modules/100/pegasus
/var/lib/selinux/minimum/active/modules/100/pegasus/cil
/var/lib/selinux/minimum/active/modules/100/pegasus/hll
/var/lib/selinux/minimum/active/modules/100/pegasus/lang_ext
/var/lib/selinux/minimum/active/modules/100/pesign
/var/lib/selinux/minimum/active/modules/100/pesign/cil
/var/lib/selinux/minimum/active/modules/100/pesign/hll
/var/lib/selinux/minimum/active/modules/100/pesign/lang_ext
/var/lib/selinux/minimum/active/modules/100/pingd
/var/lib/selinux/minimum/active/modules/100/pingd/cil
/var/lib/selinux/minimum/active/modules/100/pingd/hll
/var/lib/selinux/minimum/active/modules/100/pingd/lang_ext
/var/lib/selinux/minimum/active/modules/100/piranha
/var/lib/selinux/minimum/active/modules/100/piranha/cil
/var/lib/selinux/minimum/active/modules/100/piranha/hll
/var/lib/selinux/minimum/active/modules/100/piranha/lang_ext
/var/lib/selinux/minimum/active/modules/100/pkcs
/var/lib/selinux/minimum/active/modules/100/pkcs/cil
/var/lib/selinux/minimum/active/modules/100/pkcs/hll
/var/lib/selinux/minimum/active/modules/100/pkcs/lang_ext
/var/lib/selinux/minimum/active/modules/100/pkcs11proxyd
/var/lib/selinux/minimum/active/modules/100/pkcs11proxyd/cil
/var/lib/selinux/minimum/active/modules/100/pkcs11proxyd/hll
/var/lib/selinux/minimum/active/modules/100/pkcs11proxyd/lang_ext
/var/lib/selinux/minimum/active/modules/100/pki
/var/lib/selinux/minimum/active/modules/100/pki/cil
/var/lib/selinux/minimum/active/modules/100/pki/hll
/var/lib/selinux/minimum/active/modules/100/pki/lang_ext
/var/lib/selinux/minimum/active/modules/100/plymouthd
/var/lib/selinux/minimum/active/modules/100/plymouthd/cil
/var/lib/selinux/minimum/active/modules/100/plymouthd/hll
/var/lib/selinux/minimum/active/modules/100/plymouthd/lang_ext
/var/lib/selinux/minimum/active/modules/100/podsleuth
/var/lib/selinux/minimum/active/modules/100/podsleuth/cil
/var/lib/selinux/minimum/active/modules/100/podsleuth/hll
/var/lib/selinux/minimum/active/modules/100/podsleuth/lang_ext
/var/lib/selinux/minimum/active/modules/100/policykit
/var/lib/selinux/minimum/active/modules/100/policykit/cil
/var/lib/selinux/minimum/active/modules/100/policykit/hll
/var/lib/selinux/minimum/active/modules/100/policykit/lang_ext
/var/lib/selinux/minimum/active/modules/100/polipo
/var/lib/selinux/minimum/active/modules/100/polipo/cil
/var/lib/selinux/minimum/active/modules/100/polipo/hll
/var/lib/selinux/minimum/active/modules/100/polipo/lang_ext
/var/lib/selinux/minimum/active/modules/100/portmap
/var/lib/selinux/minimum/active/modules/100/portmap/cil
/var/lib/selinux/minimum/active/modules/100/portmap/hll
/var/lib/selinux/minimum/active/modules/100/portmap/lang_ext
/var/lib/selinux/minimum/active/modules/100/portreserve
/var/lib/selinux/minimum/active/modules/100/portreserve/cil
/var/lib/selinux/minimum/active/modules/100/portreserve/hll
/var/lib/selinux/minimum/active/modules/100/portreserve/lang_ext
/var/lib/selinux/minimum/active/modules/100/postfix
/var/lib/selinux/minimum/active/modules/100/postfix/cil
/var/lib/selinux/minimum/active/modules/100/postfix/hll
/var/lib/selinux/minimum/active/modules/100/postfix/lang_ext
/var/lib/selinux/minimum/active/modules/100/postgresql
/var/lib/selinux/minimum/active/modules/100/postgresql/cil
/var/lib/selinux/minimum/active/modules/100/postgresql/hll
/var/lib/selinux/minimum/active/modules/100/postgresql/lang_ext
/var/lib/selinux/minimum/active/modules/100/postgrey
/var/lib/selinux/minimum/active/modules/100/postgrey/cil
/var/lib/selinux/minimum/active/modules/100/postgrey/hll
/var/lib/selinux/minimum/active/modules/100/postgrey/lang_ext
/var/lib/selinux/minimum/active/modules/100/ppp
/var/lib/selinux/minimum/active/modules/100/ppp/cil
/var/lib/selinux/minimum/active/modules/100/ppp/hll
/var/lib/selinux/minimum/active/modules/100/ppp/lang_ext
/var/lib/selinux/minimum/active/modules/100/prelink
/var/lib/selinux/minimum/active/modules/100/prelink/cil
/var/lib/selinux/minimum/active/modules/100/prelink/hll
/var/lib/selinux/minimum/active/modules/100/prelink/lang_ext
/var/lib/selinux/minimum/active/modules/100/prelude
/var/lib/selinux/minimum/active/modules/100/prelude/cil
/var/lib/selinux/minimum/active/modules/100/prelude/hll
/var/lib/selinux/minimum/active/modules/100/prelude/lang_ext
/var/lib/selinux/minimum/active/modules/100/privoxy
/var/lib/selinux/minimum/active/modules/100/privoxy/cil
/var/lib/selinux/minimum/active/modules/100/privoxy/hll
/var/lib/selinux/minimum/active/modules/100/privoxy/lang_ext
/var/lib/selinux/minimum/active/modules/100/procmail
/var/lib/selinux/minimum/active/modules/100/procmail/cil
/var/lib/selinux/minimum/active/modules/100/procmail/hll
/var/lib/selinux/minimum/active/modules/100/procmail/lang_ext
/var/lib/selinux/minimum/active/modules/100/prosody
/var/lib/selinux/minimum/active/modules/100/prosody/cil
/var/lib/selinux/minimum/active/modules/100/prosody/hll
/var/lib/selinux/minimum/active/modules/100/prosody/lang_ext
/var/lib/selinux/minimum/active/modules/100/psad
/var/lib/selinux/minimum/active/modules/100/psad/cil
/var/lib/selinux/minimum/active/modules/100/psad/hll
/var/lib/selinux/minimum/active/modules/100/psad/lang_ext
/var/lib/selinux/minimum/active/modules/100/ptchown
/var/lib/selinux/minimum/active/modules/100/ptchown/cil
/var/lib/selinux/minimum/active/modules/100/ptchown/hll
/var/lib/selinux/minimum/active/modules/100/ptchown/lang_ext
/var/lib/selinux/minimum/active/modules/100/publicfile
/var/lib/selinux/minimum/active/modules/100/publicfile/cil
/var/lib/selinux/minimum/active/modules/100/publicfile/hll
/var/lib/selinux/minimum/active/modules/100/publicfile/lang_ext
/var/lib/selinux/minimum/active/modules/100/pulseaudio
/var/lib/selinux/minimum/active/modules/100/pulseaudio/cil
/var/lib/selinux/minimum/active/modules/100/pulseaudio/hll
/var/lib/selinux/minimum/active/modules/100/pulseaudio/lang_ext
/var/lib/selinux/minimum/active/modules/100/puppet
/var/lib/selinux/minimum/active/modules/100/puppet/cil
/var/lib/selinux/minimum/active/modules/100/puppet/hll
/var/lib/selinux/minimum/active/modules/100/puppet/lang_ext
/var/lib/selinux/minimum/active/modules/100/pwauth
/var/lib/selinux/minimum/active/modules/100/pwauth/cil
/var/lib/selinux/minimum/active/modules/100/pwauth/hll
/var/lib/selinux/minimum/active/modules/100/pwauth/lang_ext
/var/lib/selinux/minimum/active/modules/100/qmail
/var/lib/selinux/minimum/active/modules/100/qmail/cil
/var/lib/selinux/minimum/active/modules/100/qmail/hll
/var/lib/selinux/minimum/active/modules/100/qmail/lang_ext
/var/lib/selinux/minimum/active/modules/100/qpid
/var/lib/selinux/minimum/active/modules/100/qpid/cil
/var/lib/selinux/minimum/active/modules/100/qpid/hll
/var/lib/selinux/minimum/active/modules/100/qpid/lang_ext
/var/lib/selinux/minimum/active/modules/100/quantum
/var/lib/selinux/minimum/active/modules/100/quantum/cil
/var/lib/selinux/minimum/active/modules/100/quantum/hll
/var/lib/selinux/minimum/active/modules/100/quantum/lang_ext
/var/lib/selinux/minimum/active/modules/100/quota
/var/lib/selinux/minimum/active/modules/100/quota/cil
/var/lib/selinux/minimum/active/modules/100/quota/hll
/var/lib/selinux/minimum/active/modules/100/quota/lang_ext
/var/lib/selinux/minimum/active/modules/100/rabbitmq
/var/lib/selinux/minimum/active/modules/100/rabbitmq/cil
/var/lib/selinux/minimum/active/modules/100/rabbitmq/hll
/var/lib/selinux/minimum/active/modules/100/rabbitmq/lang_ext
/var/lib/selinux/minimum/active/modules/100/radius
/var/lib/selinux/minimum/active/modules/100/radius/cil
/var/lib/selinux/minimum/active/modules/100/radius/hll
/var/lib/selinux/minimum/active/modules/100/radius/lang_ext
/var/lib/selinux/minimum/active/modules/100/radvd
/var/lib/selinux/minimum/active/modules/100/radvd/cil
/var/lib/selinux/minimum/active/modules/100/radvd/hll
/var/lib/selinux/minimum/active/modules/100/radvd/lang_ext
/var/lib/selinux/minimum/active/modules/100/raid
/var/lib/selinux/minimum/active/modules/100/raid/cil
/var/lib/selinux/minimum/active/modules/100/raid/hll
/var/lib/selinux/minimum/active/modules/100/raid/lang_ext
/var/lib/selinux/minimum/active/modules/100/rasdaemon
/var/lib/selinux/minimum/active/modules/100/rasdaemon/cil
/var/lib/selinux/minimum/active/modules/100/rasdaemon/hll
/var/lib/selinux/minimum/active/modules/100/rasdaemon/lang_ext
/var/lib/selinux/minimum/active/modules/100/rdisc
/var/lib/selinux/minimum/active/modules/100/rdisc/cil
/var/lib/selinux/minimum/active/modules/100/rdisc/hll
/var/lib/selinux/minimum/active/modules/100/rdisc/lang_ext
/var/lib/selinux/minimum/active/modules/100/readahead
/var/lib/selinux/minimum/active/modules/100/readahead/cil
/var/lib/selinux/minimum/active/modules/100/readahead/hll
/var/lib/selinux/minimum/active/modules/100/readahead/lang_ext
/var/lib/selinux/minimum/active/modules/100/realmd
/var/lib/selinux/minimum/active/modules/100/realmd/cil
/var/lib/selinux/minimum/active/modules/100/realmd/hll
/var/lib/selinux/minimum/active/modules/100/realmd/lang_ext
/var/lib/selinux/minimum/active/modules/100/redis
/var/lib/selinux/minimum/active/modules/100/redis/cil
/var/lib/selinux/minimum/active/modules/100/redis/hll
/var/lib/selinux/minimum/active/modules/100/redis/lang_ext
/var/lib/selinux/minimum/active/modules/100/remotelogin
/var/lib/selinux/minimum/active/modules/100/remotelogin/cil
/var/lib/selinux/minimum/active/modules/100/remotelogin/hll
/var/lib/selinux/minimum/active/modules/100/remotelogin/lang_ext
/var/lib/selinux/minimum/active/modules/100/rhcs
/var/lib/selinux/minimum/active/modules/100/rhcs/cil
/var/lib/selinux/minimum/active/modules/100/rhcs/hll
/var/lib/selinux/minimum/active/modules/100/rhcs/lang_ext
/var/lib/selinux/minimum/active/modules/100/rhev
/var/lib/selinux/minimum/active/modules/100/rhev/cil
/var/lib/selinux/minimum/active/modules/100/rhev/hll
/var/lib/selinux/minimum/active/modules/100/rhev/lang_ext
/var/lib/selinux/minimum/active/modules/100/rhgb
/var/lib/selinux/minimum/active/modules/100/rhgb/cil
/var/lib/selinux/minimum/active/modules/100/rhgb/hll
/var/lib/selinux/minimum/active/modules/100/rhgb/lang_ext
/var/lib/selinux/minimum/active/modules/100/rhnsd
/var/lib/selinux/minimum/active/modules/100/rhnsd/cil
/var/lib/selinux/minimum/active/modules/100/rhnsd/hll
/var/lib/selinux/minimum/active/modules/100/rhnsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/rhsmcertd
/var/lib/selinux/minimum/active/modules/100/rhsmcertd/cil
/var/lib/selinux/minimum/active/modules/100/rhsmcertd/hll
/var/lib/selinux/minimum/active/modules/100/rhsmcertd/lang_ext
/var/lib/selinux/minimum/active/modules/100/ricci
/var/lib/selinux/minimum/active/modules/100/ricci/cil
/var/lib/selinux/minimum/active/modules/100/ricci/hll
/var/lib/selinux/minimum/active/modules/100/ricci/lang_ext
/var/lib/selinux/minimum/active/modules/100/rkhunter
/var/lib/selinux/minimum/active/modules/100/rkhunter/cil
/var/lib/selinux/minimum/active/modules/100/rkhunter/hll
/var/lib/selinux/minimum/active/modules/100/rkhunter/lang_ext
/var/lib/selinux/minimum/active/modules/100/rkt
/var/lib/selinux/minimum/active/modules/100/rkt/cil
/var/lib/selinux/minimum/active/modules/100/rkt/hll
/var/lib/selinux/minimum/active/modules/100/rkt/lang_ext
/var/lib/selinux/minimum/active/modules/100/rlogin
/var/lib/selinux/minimum/active/modules/100/rlogin/cil
/var/lib/selinux/minimum/active/modules/100/rlogin/hll
/var/lib/selinux/minimum/active/modules/100/rlogin/lang_ext
/var/lib/selinux/minimum/active/modules/100/rngd
/var/lib/selinux/minimum/active/modules/100/rngd/cil
/var/lib/selinux/minimum/active/modules/100/rngd/hll
/var/lib/selinux/minimum/active/modules/100/rngd/lang_ext
/var/lib/selinux/minimum/active/modules/100/rolekit
/var/lib/selinux/minimum/active/modules/100/rolekit/cil
/var/lib/selinux/minimum/active/modules/100/rolekit/hll
/var/lib/selinux/minimum/active/modules/100/rolekit/lang_ext
/var/lib/selinux/minimum/active/modules/100/roundup
/var/lib/selinux/minimum/active/modules/100/roundup/cil
/var/lib/selinux/minimum/active/modules/100/roundup/hll
/var/lib/selinux/minimum/active/modules/100/roundup/lang_ext
/var/lib/selinux/minimum/active/modules/100/rpc
/var/lib/selinux/minimum/active/modules/100/rpc/cil
/var/lib/selinux/minimum/active/modules/100/rpc/hll
/var/lib/selinux/minimum/active/modules/100/rpc/lang_ext
/var/lib/selinux/minimum/active/modules/100/rpcbind
/var/lib/selinux/minimum/active/modules/100/rpcbind/cil
/var/lib/selinux/minimum/active/modules/100/rpcbind/hll
/var/lib/selinux/minimum/active/modules/100/rpcbind/lang_ext
/var/lib/selinux/minimum/active/modules/100/rpm
/var/lib/selinux/minimum/active/modules/100/rpm/cil
/var/lib/selinux/minimum/active/modules/100/rpm/hll
/var/lib/selinux/minimum/active/modules/100/rpm/lang_ext
/var/lib/selinux/minimum/active/modules/100/rrdcached
/var/lib/selinux/minimum/active/modules/100/rrdcached/cil
/var/lib/selinux/minimum/active/modules/100/rrdcached/hll
/var/lib/selinux/minimum/active/modules/100/rrdcached/lang_ext
/var/lib/selinux/minimum/active/modules/100/rshd
/var/lib/selinux/minimum/active/modules/100/rshd/cil
/var/lib/selinux/minimum/active/modules/100/rshd/hll
/var/lib/selinux/minimum/active/modules/100/rshd/lang_ext
/var/lib/selinux/minimum/active/modules/100/rssh
/var/lib/selinux/minimum/active/modules/100/rssh/cil
/var/lib/selinux/minimum/active/modules/100/rssh/hll
/var/lib/selinux/minimum/active/modules/100/rssh/lang_ext
/var/lib/selinux/minimum/active/modules/100/rsync
/var/lib/selinux/minimum/active/modules/100/rsync/cil
/var/lib/selinux/minimum/active/modules/100/rsync/hll
/var/lib/selinux/minimum/active/modules/100/rsync/lang_ext
/var/lib/selinux/minimum/active/modules/100/rtas
/var/lib/selinux/minimum/active/modules/100/rtas/cil
/var/lib/selinux/minimum/active/modules/100/rtas/hll
/var/lib/selinux/minimum/active/modules/100/rtas/lang_ext
/var/lib/selinux/minimum/active/modules/100/rtkit
/var/lib/selinux/minimum/active/modules/100/rtkit/cil
/var/lib/selinux/minimum/active/modules/100/rtkit/hll
/var/lib/selinux/minimum/active/modules/100/rtkit/lang_ext
/var/lib/selinux/minimum/active/modules/100/rwho
/var/lib/selinux/minimum/active/modules/100/rwho/cil
/var/lib/selinux/minimum/active/modules/100/rwho/hll
/var/lib/selinux/minimum/active/modules/100/rwho/lang_ext
/var/lib/selinux/minimum/active/modules/100/samba
/var/lib/selinux/minimum/active/modules/100/samba/cil
/var/lib/selinux/minimum/active/modules/100/samba/hll
/var/lib/selinux/minimum/active/modules/100/samba/lang_ext
/var/lib/selinux/minimum/active/modules/100/sambagui
/var/lib/selinux/minimum/active/modules/100/sambagui/cil
/var/lib/selinux/minimum/active/modules/100/sambagui/hll
/var/lib/selinux/minimum/active/modules/100/sambagui/lang_ext
/var/lib/selinux/minimum/active/modules/100/sandboxX
/var/lib/selinux/minimum/active/modules/100/sandboxX/cil
/var/lib/selinux/minimum/active/modules/100/sandboxX/hll
/var/lib/selinux/minimum/active/modules/100/sandboxX/lang_ext
/var/lib/selinux/minimum/active/modules/100/sanlock
/var/lib/selinux/minimum/active/modules/100/sanlock/cil
/var/lib/selinux/minimum/active/modules/100/sanlock/hll
/var/lib/selinux/minimum/active/modules/100/sanlock/lang_ext
/var/lib/selinux/minimum/active/modules/100/sasl
/var/lib/selinux/minimum/active/modules/100/sasl/cil
/var/lib/selinux/minimum/active/modules/100/sasl/hll
/var/lib/selinux/minimum/active/modules/100/sasl/lang_ext
/var/lib/selinux/minimum/active/modules/100/sbd
/var/lib/selinux/minimum/active/modules/100/sbd/cil
/var/lib/selinux/minimum/active/modules/100/sbd/hll
/var/lib/selinux/minimum/active/modules/100/sbd/lang_ext
/var/lib/selinux/minimum/active/modules/100/sblim
/var/lib/selinux/minimum/active/modules/100/sblim/cil
/var/lib/selinux/minimum/active/modules/100/sblim/hll
/var/lib/selinux/minimum/active/modules/100/sblim/lang_ext
/var/lib/selinux/minimum/active/modules/100/screen
/var/lib/selinux/minimum/active/modules/100/screen/cil
/var/lib/selinux/minimum/active/modules/100/screen/hll
/var/lib/selinux/minimum/active/modules/100/screen/lang_ext
/var/lib/selinux/minimum/active/modules/100/secadm
/var/lib/selinux/minimum/active/modules/100/secadm/cil
/var/lib/selinux/minimum/active/modules/100/secadm/hll
/var/lib/selinux/minimum/active/modules/100/secadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/sectoolm
/var/lib/selinux/minimum/active/modules/100/sectoolm/cil
/var/lib/selinux/minimum/active/modules/100/sectoolm/hll
/var/lib/selinux/minimum/active/modules/100/sectoolm/lang_ext
/var/lib/selinux/minimum/active/modules/100/selinuxutil
/var/lib/selinux/minimum/active/modules/100/selinuxutil/cil
/var/lib/selinux/minimum/active/modules/100/selinuxutil/hll
/var/lib/selinux/minimum/active/modules/100/selinuxutil/lang_ext
/var/lib/selinux/minimum/active/modules/100/sendmail
/var/lib/selinux/minimum/active/modules/100/sendmail/cil
/var/lib/selinux/minimum/active/modules/100/sendmail/hll
/var/lib/selinux/minimum/active/modules/100/sendmail/lang_ext
/var/lib/selinux/minimum/active/modules/100/sensord
/var/lib/selinux/minimum/active/modules/100/sensord/cil
/var/lib/selinux/minimum/active/modules/100/sensord/hll
/var/lib/selinux/minimum/active/modules/100/sensord/lang_ext
/var/lib/selinux/minimum/active/modules/100/setrans
/var/lib/selinux/minimum/active/modules/100/setrans/cil
/var/lib/selinux/minimum/active/modules/100/setrans/hll
/var/lib/selinux/minimum/active/modules/100/setrans/lang_ext
/var/lib/selinux/minimum/active/modules/100/setroubleshoot
/var/lib/selinux/minimum/active/modules/100/setroubleshoot/cil
/var/lib/selinux/minimum/active/modules/100/setroubleshoot/hll
/var/lib/selinux/minimum/active/modules/100/setroubleshoot/lang_ext
/var/lib/selinux/minimum/active/modules/100/seunshare
/var/lib/selinux/minimum/active/modules/100/seunshare/cil
/var/lib/selinux/minimum/active/modules/100/seunshare/hll
/var/lib/selinux/minimum/active/modules/100/seunshare/lang_ext
/var/lib/selinux/minimum/active/modules/100/sge
/var/lib/selinux/minimum/active/modules/100/sge/cil
/var/lib/selinux/minimum/active/modules/100/sge/hll
/var/lib/selinux/minimum/active/modules/100/sge/lang_ext
/var/lib/selinux/minimum/active/modules/100/shorewall
/var/lib/selinux/minimum/active/modules/100/shorewall/cil
/var/lib/selinux/minimum/active/modules/100/shorewall/hll
/var/lib/selinux/minimum/active/modules/100/shorewall/lang_ext
/var/lib/selinux/minimum/active/modules/100/slocate
/var/lib/selinux/minimum/active/modules/100/slocate/cil
/var/lib/selinux/minimum/active/modules/100/slocate/hll
/var/lib/selinux/minimum/active/modules/100/slocate/lang_ext
/var/lib/selinux/minimum/active/modules/100/slpd
/var/lib/selinux/minimum/active/modules/100/slpd/cil
/var/lib/selinux/minimum/active/modules/100/slpd/hll
/var/lib/selinux/minimum/active/modules/100/slpd/lang_ext
/var/lib/selinux/minimum/active/modules/100/smartmon
/var/lib/selinux/minimum/active/modules/100/smartmon/cil
/var/lib/selinux/minimum/active/modules/100/smartmon/hll
/var/lib/selinux/minimum/active/modules/100/smartmon/lang_ext
/var/lib/selinux/minimum/active/modules/100/smokeping
/var/lib/selinux/minimum/active/modules/100/smokeping/cil
/var/lib/selinux/minimum/active/modules/100/smokeping/hll
/var/lib/selinux/minimum/active/modules/100/smokeping/lang_ext
/var/lib/selinux/minimum/active/modules/100/smoltclient
/var/lib/selinux/minimum/active/modules/100/smoltclient/cil
/var/lib/selinux/minimum/active/modules/100/smoltclient/hll
/var/lib/selinux/minimum/active/modules/100/smoltclient/lang_ext
/var/lib/selinux/minimum/active/modules/100/smsd
/var/lib/selinux/minimum/active/modules/100/smsd/cil
/var/lib/selinux/minimum/active/modules/100/smsd/hll
/var/lib/selinux/minimum/active/modules/100/smsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/snapper
/var/lib/selinux/minimum/active/modules/100/snapper/cil
/var/lib/selinux/minimum/active/modules/100/snapper/hll
/var/lib/selinux/minimum/active/modules/100/snapper/lang_ext
/var/lib/selinux/minimum/active/modules/100/snmp
/var/lib/selinux/minimum/active/modules/100/snmp/cil
/var/lib/selinux/minimum/active/modules/100/snmp/hll
/var/lib/selinux/minimum/active/modules/100/snmp/lang_ext
/var/lib/selinux/minimum/active/modules/100/snort
/var/lib/selinux/minimum/active/modules/100/snort/cil
/var/lib/selinux/minimum/active/modules/100/snort/hll
/var/lib/selinux/minimum/active/modules/100/snort/lang_ext
/var/lib/selinux/minimum/active/modules/100/sosreport
/var/lib/selinux/minimum/active/modules/100/sosreport/cil
/var/lib/selinux/minimum/active/modules/100/sosreport/hll
/var/lib/selinux/minimum/active/modules/100/sosreport/lang_ext
/var/lib/selinux/minimum/active/modules/100/soundserver
/var/lib/selinux/minimum/active/modules/100/soundserver/cil
/var/lib/selinux/minimum/active/modules/100/soundserver/hll
/var/lib/selinux/minimum/active/modules/100/soundserver/lang_ext
/var/lib/selinux/minimum/active/modules/100/spamassassin
/var/lib/selinux/minimum/active/modules/100/spamassassin/cil
/var/lib/selinux/minimum/active/modules/100/spamassassin/hll
/var/lib/selinux/minimum/active/modules/100/spamassassin/lang_ext
/var/lib/selinux/minimum/active/modules/100/speech-dispatcher
/var/lib/selinux/minimum/active/modules/100/speech-dispatcher/cil
/var/lib/selinux/minimum/active/modules/100/speech-dispatcher/hll
/var/lib/selinux/minimum/active/modules/100/speech-dispatcher/lang_ext
/var/lib/selinux/minimum/active/modules/100/squid
/var/lib/selinux/minimum/active/modules/100/squid/cil
/var/lib/selinux/minimum/active/modules/100/squid/hll
/var/lib/selinux/minimum/active/modules/100/squid/lang_ext
/var/lib/selinux/minimum/active/modules/100/ssh
/var/lib/selinux/minimum/active/modules/100/ssh/cil
/var/lib/selinux/minimum/active/modules/100/ssh/hll
/var/lib/selinux/minimum/active/modules/100/ssh/lang_ext
/var/lib/selinux/minimum/active/modules/100/sslh
/var/lib/selinux/minimum/active/modules/100/sslh/cil
/var/lib/selinux/minimum/active/modules/100/sslh/hll
/var/lib/selinux/minimum/active/modules/100/sslh/lang_ext
/var/lib/selinux/minimum/active/modules/100/sssd
/var/lib/selinux/minimum/active/modules/100/sssd/cil
/var/lib/selinux/minimum/active/modules/100/sssd/hll
/var/lib/selinux/minimum/active/modules/100/sssd/lang_ext
/var/lib/selinux/minimum/active/modules/100/staff
/var/lib/selinux/minimum/active/modules/100/staff/cil
/var/lib/selinux/minimum/active/modules/100/staff/hll
/var/lib/selinux/minimum/active/modules/100/staff/lang_ext
/var/lib/selinux/minimum/active/modules/100/stapserver
/var/lib/selinux/minimum/active/modules/100/stapserver/cil
/var/lib/selinux/minimum/active/modules/100/stapserver/hll
/var/lib/selinux/minimum/active/modules/100/stapserver/lang_ext
/var/lib/selinux/minimum/active/modules/100/stratisd
/var/lib/selinux/minimum/active/modules/100/stratisd/cil
/var/lib/selinux/minimum/active/modules/100/stratisd/hll
/var/lib/selinux/minimum/active/modules/100/stratisd/lang_ext
/var/lib/selinux/minimum/active/modules/100/stunnel
/var/lib/selinux/minimum/active/modules/100/stunnel/cil
/var/lib/selinux/minimum/active/modules/100/stunnel/hll
/var/lib/selinux/minimum/active/modules/100/stunnel/lang_ext
/var/lib/selinux/minimum/active/modules/100/su
/var/lib/selinux/minimum/active/modules/100/su/cil
/var/lib/selinux/minimum/active/modules/100/su/hll
/var/lib/selinux/minimum/active/modules/100/su/lang_ext
/var/lib/selinux/minimum/active/modules/100/sudo
/var/lib/selinux/minimum/active/modules/100/sudo/cil
/var/lib/selinux/minimum/active/modules/100/sudo/hll
/var/lib/selinux/minimum/active/modules/100/sudo/lang_ext
/var/lib/selinux/minimum/active/modules/100/svnserve
/var/lib/selinux/minimum/active/modules/100/svnserve/cil
/var/lib/selinux/minimum/active/modules/100/svnserve/hll
/var/lib/selinux/minimum/active/modules/100/svnserve/lang_ext
/var/lib/selinux/minimum/active/modules/100/swift
/var/lib/selinux/minimum/active/modules/100/swift/cil
/var/lib/selinux/minimum/active/modules/100/swift/hll
/var/lib/selinux/minimum/active/modules/100/swift/lang_ext
/var/lib/selinux/minimum/active/modules/100/sysadm
/var/lib/selinux/minimum/active/modules/100/sysadm/cil
/var/lib/selinux/minimum/active/modules/100/sysadm/hll
/var/lib/selinux/minimum/active/modules/100/sysadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/sysadm_secadm
/var/lib/selinux/minimum/active/modules/100/sysadm_secadm/cil
/var/lib/selinux/minimum/active/modules/100/sysadm_secadm/hll
/var/lib/selinux/minimum/active/modules/100/sysadm_secadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/sysnetwork
/var/lib/selinux/minimum/active/modules/100/sysnetwork/cil
/var/lib/selinux/minimum/active/modules/100/sysnetwork/hll
/var/lib/selinux/minimum/active/modules/100/sysnetwork/lang_ext
/var/lib/selinux/minimum/active/modules/100/sysstat
/var/lib/selinux/minimum/active/modules/100/sysstat/cil
/var/lib/selinux/minimum/active/modules/100/sysstat/hll
/var/lib/selinux/minimum/active/modules/100/sysstat/lang_ext
/var/lib/selinux/minimum/active/modules/100/systemd
/var/lib/selinux/minimum/active/modules/100/systemd/cil
/var/lib/selinux/minimum/active/modules/100/systemd/hll
/var/lib/selinux/minimum/active/modules/100/systemd/lang_ext
/var/lib/selinux/minimum/active/modules/100/tangd
/var/lib/selinux/minimum/active/modules/100/tangd/cil
/var/lib/selinux/minimum/active/modules/100/tangd/hll
/var/lib/selinux/minimum/active/modules/100/tangd/lang_ext
/var/lib/selinux/minimum/active/modules/100/targetd
/var/lib/selinux/minimum/active/modules/100/targetd/cil
/var/lib/selinux/minimum/active/modules/100/targetd/hll
/var/lib/selinux/minimum/active/modules/100/targetd/lang_ext
/var/lib/selinux/minimum/active/modules/100/tcpd
/var/lib/selinux/minimum/active/modules/100/tcpd/cil
/var/lib/selinux/minimum/active/modules/100/tcpd/hll
/var/lib/selinux/minimum/active/modules/100/tcpd/lang_ext
/var/lib/selinux/minimum/active/modules/100/tcsd
/var/lib/selinux/minimum/active/modules/100/tcsd/cil
/var/lib/selinux/minimum/active/modules/100/tcsd/hll
/var/lib/selinux/minimum/active/modules/100/tcsd/lang_ext
/var/lib/selinux/minimum/active/modules/100/telepathy
/var/lib/selinux/minimum/active/modules/100/telepathy/cil
/var/lib/selinux/minimum/active/modules/100/telepathy/hll
/var/lib/selinux/minimum/active/modules/100/telepathy/lang_ext
/var/lib/selinux/minimum/active/modules/100/telnet
/var/lib/selinux/minimum/active/modules/100/telnet/cil
/var/lib/selinux/minimum/active/modules/100/telnet/hll
/var/lib/selinux/minimum/active/modules/100/telnet/lang_ext
/var/lib/selinux/minimum/active/modules/100/tftp
/var/lib/selinux/minimum/active/modules/100/tftp/cil
/var/lib/selinux/minimum/active/modules/100/tftp/hll
/var/lib/selinux/minimum/active/modules/100/tftp/lang_ext
/var/lib/selinux/minimum/active/modules/100/tgtd
/var/lib/selinux/minimum/active/modules/100/tgtd/cil
/var/lib/selinux/minimum/active/modules/100/tgtd/hll
/var/lib/selinux/minimum/active/modules/100/tgtd/lang_ext
/var/lib/selinux/minimum/active/modules/100/thin
/var/lib/selinux/minimum/active/modules/100/thin/cil
/var/lib/selinux/minimum/active/modules/100/thin/hll
/var/lib/selinux/minimum/active/modules/100/thin/lang_ext
/var/lib/selinux/minimum/active/modules/100/thumb
/var/lib/selinux/minimum/active/modules/100/thumb/cil
/var/lib/selinux/minimum/active/modules/100/thumb/hll
/var/lib/selinux/minimum/active/modules/100/thumb/lang_ext
/var/lib/selinux/minimum/active/modules/100/timedatex
/var/lib/selinux/minimum/active/modules/100/timedatex/cil
/var/lib/selinux/minimum/active/modules/100/timedatex/hll
/var/lib/selinux/minimum/active/modules/100/timedatex/lang_ext
/var/lib/selinux/minimum/active/modules/100/tlp
/var/lib/selinux/minimum/active/modules/100/tlp/cil
/var/lib/selinux/minimum/active/modules/100/tlp/hll
/var/lib/selinux/minimum/active/modules/100/tlp/lang_ext
/var/lib/selinux/minimum/active/modules/100/tmpreaper
/var/lib/selinux/minimum/active/modules/100/tmpreaper/cil
/var/lib/selinux/minimum/active/modules/100/tmpreaper/hll
/var/lib/selinux/minimum/active/modules/100/tmpreaper/lang_ext
/var/lib/selinux/minimum/active/modules/100/tomcat
/var/lib/selinux/minimum/active/modules/100/tomcat/cil
/var/lib/selinux/minimum/active/modules/100/tomcat/hll
/var/lib/selinux/minimum/active/modules/100/tomcat/lang_ext
/var/lib/selinux/minimum/active/modules/100/tor
/var/lib/selinux/minimum/active/modules/100/tor/cil
/var/lib/selinux/minimum/active/modules/100/tor/hll
/var/lib/selinux/minimum/active/modules/100/tor/lang_ext
/var/lib/selinux/minimum/active/modules/100/tuned
/var/lib/selinux/minimum/active/modules/100/tuned/cil
/var/lib/selinux/minimum/active/modules/100/tuned/hll
/var/lib/selinux/minimum/active/modules/100/tuned/lang_ext
/var/lib/selinux/minimum/active/modules/100/tvtime
/var/lib/selinux/minimum/active/modules/100/tvtime/cil
/var/lib/selinux/minimum/active/modules/100/tvtime/hll
/var/lib/selinux/minimum/active/modules/100/tvtime/lang_ext
/var/lib/selinux/minimum/active/modules/100/udev
/var/lib/selinux/minimum/active/modules/100/udev/cil
/var/lib/selinux/minimum/active/modules/100/udev/hll
/var/lib/selinux/minimum/active/modules/100/udev/lang_ext
/var/lib/selinux/minimum/active/modules/100/ulogd
/var/lib/selinux/minimum/active/modules/100/ulogd/cil
/var/lib/selinux/minimum/active/modules/100/ulogd/hll
/var/lib/selinux/minimum/active/modules/100/ulogd/lang_ext
/var/lib/selinux/minimum/active/modules/100/uml
/var/lib/selinux/minimum/active/modules/100/uml/cil
/var/lib/selinux/minimum/active/modules/100/uml/hll
/var/lib/selinux/minimum/active/modules/100/uml/lang_ext
/var/lib/selinux/minimum/active/modules/100/unconfined
/var/lib/selinux/minimum/active/modules/100/unconfined/cil
/var/lib/selinux/minimum/active/modules/100/unconfined/hll
/var/lib/selinux/minimum/active/modules/100/unconfined/lang_ext
/var/lib/selinux/minimum/active/modules/100/unconfineduser
/var/lib/selinux/minimum/active/modules/100/unconfineduser/cil
/var/lib/selinux/minimum/active/modules/100/unconfineduser/hll
/var/lib/selinux/minimum/active/modules/100/unconfineduser/lang_ext
/var/lib/selinux/minimum/active/modules/100/unlabelednet
/var/lib/selinux/minimum/active/modules/100/unlabelednet/cil
/var/lib/selinux/minimum/active/modules/100/unlabelednet/hll
/var/lib/selinux/minimum/active/modules/100/unlabelednet/lang_ext
/var/lib/selinux/minimum/active/modules/100/unprivuser
/var/lib/selinux/minimum/active/modules/100/unprivuser/cil
/var/lib/selinux/minimum/active/modules/100/unprivuser/hll
/var/lib/selinux/minimum/active/modules/100/unprivuser/lang_ext
/var/lib/selinux/minimum/active/modules/100/updfstab
/var/lib/selinux/minimum/active/modules/100/updfstab/cil
/var/lib/selinux/minimum/active/modules/100/updfstab/hll
/var/lib/selinux/minimum/active/modules/100/updfstab/lang_ext
/var/lib/selinux/minimum/active/modules/100/usbmodules
/var/lib/selinux/minimum/active/modules/100/usbmodules/cil
/var/lib/selinux/minimum/active/modules/100/usbmodules/hll
/var/lib/selinux/minimum/active/modules/100/usbmodules/lang_ext
/var/lib/selinux/minimum/active/modules/100/usbmuxd
/var/lib/selinux/minimum/active/modules/100/usbmuxd/cil
/var/lib/selinux/minimum/active/modules/100/usbmuxd/hll
/var/lib/selinux/minimum/active/modules/100/usbmuxd/lang_ext
/var/lib/selinux/minimum/active/modules/100/userdomain
/var/lib/selinux/minimum/active/modules/100/userdomain/cil
/var/lib/selinux/minimum/active/modules/100/userdomain/hll
/var/lib/selinux/minimum/active/modules/100/userdomain/lang_ext
/var/lib/selinux/minimum/active/modules/100/userhelper
/var/lib/selinux/minimum/active/modules/100/userhelper/cil
/var/lib/selinux/minimum/active/modules/100/userhelper/hll
/var/lib/selinux/minimum/active/modules/100/userhelper/lang_ext
/var/lib/selinux/minimum/active/modules/100/usermanage
/var/lib/selinux/minimum/active/modules/100/usermanage/cil
/var/lib/selinux/minimum/active/modules/100/usermanage/hll
/var/lib/selinux/minimum/active/modules/100/usermanage/lang_ext
/var/lib/selinux/minimum/active/modules/100/usernetctl
/var/lib/selinux/minimum/active/modules/100/usernetctl/cil
/var/lib/selinux/minimum/active/modules/100/usernetctl/hll
/var/lib/selinux/minimum/active/modules/100/usernetctl/lang_ext
/var/lib/selinux/minimum/active/modules/100/uucp
/var/lib/selinux/minimum/active/modules/100/uucp/cil
/var/lib/selinux/minimum/active/modules/100/uucp/hll
/var/lib/selinux/minimum/active/modules/100/uucp/lang_ext
/var/lib/selinux/minimum/active/modules/100/uuidd
/var/lib/selinux/minimum/active/modules/100/uuidd/cil
/var/lib/selinux/minimum/active/modules/100/uuidd/hll
/var/lib/selinux/minimum/active/modules/100/uuidd/lang_ext
/var/lib/selinux/minimum/active/modules/100/varnishd
/var/lib/selinux/minimum/active/modules/100/varnishd/cil
/var/lib/selinux/minimum/active/modules/100/varnishd/hll
/var/lib/selinux/minimum/active/modules/100/varnishd/lang_ext
/var/lib/selinux/minimum/active/modules/100/vdagent
/var/lib/selinux/minimum/active/modules/100/vdagent/cil
/var/lib/selinux/minimum/active/modules/100/vdagent/hll
/var/lib/selinux/minimum/active/modules/100/vdagent/lang_ext
/var/lib/selinux/minimum/active/modules/100/vhostmd
/var/lib/selinux/minimum/active/modules/100/vhostmd/cil
/var/lib/selinux/minimum/active/modules/100/vhostmd/hll
/var/lib/selinux/minimum/active/modules/100/vhostmd/lang_ext
/var/lib/selinux/minimum/active/modules/100/virt
/var/lib/selinux/minimum/active/modules/100/virt/cil
/var/lib/selinux/minimum/active/modules/100/virt/hll
/var/lib/selinux/minimum/active/modules/100/virt/lang_ext
/var/lib/selinux/minimum/active/modules/100/vlock
/var/lib/selinux/minimum/active/modules/100/vlock/cil
/var/lib/selinux/minimum/active/modules/100/vlock/hll
/var/lib/selinux/minimum/active/modules/100/vlock/lang_ext
/var/lib/selinux/minimum/active/modules/100/vmtools
/var/lib/selinux/minimum/active/modules/100/vmtools/cil
/var/lib/selinux/minimum/active/modules/100/vmtools/hll
/var/lib/selinux/minimum/active/modules/100/vmtools/lang_ext
/var/lib/selinux/minimum/active/modules/100/vmware
/var/lib/selinux/minimum/active/modules/100/vmware/cil
/var/lib/selinux/minimum/active/modules/100/vmware/hll
/var/lib/selinux/minimum/active/modules/100/vmware/lang_ext
/var/lib/selinux/minimum/active/modules/100/vnstatd
/var/lib/selinux/minimum/active/modules/100/vnstatd/cil
/var/lib/selinux/minimum/active/modules/100/vnstatd/hll
/var/lib/selinux/minimum/active/modules/100/vnstatd/lang_ext
/var/lib/selinux/minimum/active/modules/100/vpn
/var/lib/selinux/minimum/active/modules/100/vpn/cil
/var/lib/selinux/minimum/active/modules/100/vpn/hll
/var/lib/selinux/minimum/active/modules/100/vpn/lang_ext
/var/lib/selinux/minimum/active/modules/100/w3c
/var/lib/selinux/minimum/active/modules/100/w3c/cil
/var/lib/selinux/minimum/active/modules/100/w3c/hll
/var/lib/selinux/minimum/active/modules/100/w3c/lang_ext
/var/lib/selinux/minimum/active/modules/100/watchdog
/var/lib/selinux/minimum/active/modules/100/watchdog/cil
/var/lib/selinux/minimum/active/modules/100/watchdog/hll
/var/lib/selinux/minimum/active/modules/100/watchdog/lang_ext
/var/lib/selinux/minimum/active/modules/100/wdmd
/var/lib/selinux/minimum/active/modules/100/wdmd/cil
/var/lib/selinux/minimum/active/modules/100/wdmd/hll
/var/lib/selinux/minimum/active/modules/100/wdmd/lang_ext
/var/lib/selinux/minimum/active/modules/100/webadm
/var/lib/selinux/minimum/active/modules/100/webadm/cil
/var/lib/selinux/minimum/active/modules/100/webadm/hll
/var/lib/selinux/minimum/active/modules/100/webadm/lang_ext
/var/lib/selinux/minimum/active/modules/100/webalizer
/var/lib/selinux/minimum/active/modules/100/webalizer/cil
/var/lib/selinux/minimum/active/modules/100/webalizer/hll
/var/lib/selinux/minimum/active/modules/100/webalizer/lang_ext
/var/lib/selinux/minimum/active/modules/100/wine
/var/lib/selinux/minimum/active/modules/100/wine/cil
/var/lib/selinux/minimum/active/modules/100/wine/hll
/var/lib/selinux/minimum/active/modules/100/wine/lang_ext
/var/lib/selinux/minimum/active/modules/100/wireshark
/var/lib/selinux/minimum/active/modules/100/wireshark/cil
/var/lib/selinux/minimum/active/modules/100/wireshark/hll
/var/lib/selinux/minimum/active/modules/100/wireshark/lang_ext
/var/lib/selinux/minimum/active/modules/100/xen
/var/lib/selinux/minimum/active/modules/100/xen/cil
/var/lib/selinux/minimum/active/modules/100/xen/hll
/var/lib/selinux/minimum/active/modules/100/xen/lang_ext
/var/lib/selinux/minimum/active/modules/100/xguest
/var/lib/selinux/minimum/active/modules/100/xguest/cil
/var/lib/selinux/minimum/active/modules/100/xguest/hll
/var/lib/selinux/minimum/active/modules/100/xguest/lang_ext
/var/lib/selinux/minimum/active/modules/100/xserver
/var/lib/selinux/minimum/active/modules/100/xserver/cil
/var/lib/selinux/minimum/active/modules/100/xserver/hll
/var/lib/selinux/minimum/active/modules/100/xserver/lang_ext
/var/lib/selinux/minimum/active/modules/100/zabbix
/var/lib/selinux/minimum/active/modules/100/zabbix/cil
/var/lib/selinux/minimum/active/modules/100/zabbix/hll
/var/lib/selinux/minimum/active/modules/100/zabbix/lang_ext
/var/lib/selinux/minimum/active/modules/100/zarafa
/var/lib/selinux/minimum/active/modules/100/zarafa/cil
/var/lib/selinux/minimum/active/modules/100/zarafa/hll
/var/lib/selinux/minimum/active/modules/100/zarafa/lang_ext
/var/lib/selinux/minimum/active/modules/100/zebra
/var/lib/selinux/minimum/active/modules/100/zebra/cil
/var/lib/selinux/minimum/active/modules/100/zebra/hll
/var/lib/selinux/minimum/active/modules/100/zebra/lang_ext
/var/lib/selinux/minimum/active/modules/100/zoneminder
/var/lib/selinux/minimum/active/modules/100/zoneminder/cil
/var/lib/selinux/minimum/active/modules/100/zoneminder/hll
/var/lib/selinux/minimum/active/modules/100/zoneminder/lang_ext
/var/lib/selinux/minimum/active/modules/100/zosremote
/var/lib/selinux/minimum/active/modules/100/zosremote/cil
/var/lib/selinux/minimum/active/modules/100/zosremote/hll
/var/lib/selinux/minimum/active/modules/100/zosremote/lang_ext
/var/lib/selinux/minimum/active/policy.kern
/var/lib/selinux/minimum/active/policy.linked
/var/lib/selinux/minimum/active/seusers
/var/lib/selinux/minimum/active/seusers.linked
/var/lib/selinux/minimum/active/users_extra
/var/lib/selinux/minimum/active/users_extra.linked
/var/lib/selinux/minimum/semanage.read.LOCK
/var/lib/selinux/minimum/semanage.trans.LOCK


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Sep 20 23:22:47 2021