Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: selinux-policy-devel | Distribution: Fedora Project |
Version: 41.3 | Vendor: Fedora Project |
Release: 1.fc41 | Build date: Fri Jun 14 14:04:11 2024 |
Group: Unspecified | Build host: buildvm-a64-09.iad2.fedoraproject.org |
Size: 14651341 | Source RPM: selinux-policy-41.3-1.fc41.src.rpm |
Packager: Fedora Project | |
Url: https://github.com/fedora-selinux/selinux-policy | |
Summary: SELinux policy development files |
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.
GPL-2.0-or-later
* Tue Jun 11 2024 Zdenek Pytela <zpytela@redhat.com> - 41.3-1 - Update systemd-generator policy - Remove permissive domain for bootupd_t - Remove permissive domain for coreos_installer_t - Remove permissive domain for afterburn_t - Add the sap module to modules.conf - Move unconfined_domain(sap_unconfined_t) to an optional block - Create the sap module - Allow systemd-coredumpd sys_admin and sys_resource capabilities - Allow systemd-coredump read nsfs files - Allow generators auto file transition only for plain files - Allow systemd-hwdb write to the kernel messages device - Escape "interface" as a file name in a virt filetrans pattern - Allow gnome-software work for login_userdomain - Allow systemd-machined manage runtime sockets - Revert "Allow systemd-machined manage runtime sockets" * Fri Jun 07 2024 Zdenek Pytela <zpytela@redhat.com> - 41.2-1 - Allow postfix_domain connect to postgresql over a unix socket - Dontaudit systemd-coredump sys_admin capability - Allow all domains read and write z90crypt device - Allow tpm2 generator setfscreate - Allow systemd (PID 1) manage systemd conf files - Allow pulseaudio map its runtime files - Update policy for getty-generator - Allow systemd-hwdb send messages to kernel unix datagram sockets - Allow systemd-machined manage runtime sockets * Mon Jun 03 2024 Zdenek Pytela <zpytela@redhat.com> - 41.1-1 - Allow fstab-generator create unit file symlinks - Update policy for cryptsetup-generator - Update policy for fstab-generator - Allow virtqemud read vm sysctls - Allow collectd to trace processes in user namespace - Allow bootupd search efivarfs dirs - Add policy for systemd-mountfsd - Add policy for systemd-nsresourced - Update policy generators - Add policy for anaconda-generator - Update policy for fstab and gpt generators - Add policy for kdump-dep-generator * Thu May 30 2024 Zdenek Pytela <zpytela@redhat.com> - 40.21-1 - Add policy for a generic generator - Add policy for tpm2 generator - Add policy for ssh-generator - Add policy for second batch of generators - Update policy for systemd generators - ci: Adjust Cockpit test plans * Sun May 19 2024 Zdenek Pytela <zpytela@redhat.com> - 40.20-1 - Allow journald read systemd config files and directories - Allow systemd_domain read systemd_conf_t dirs - Fix bad Python regexp escapes - Allow fido services connect to postgres database * Fri May 17 2024 Zdenek Pytela <zpytela@redhat.com> - 40.19-1 - Allow postfix smtpd map aliases file - Ensure dbus communication is allowed bidirectionally - Label systemd configuration files with systemd_conf_t - Label /run/systemd/machine with systemd_machined_var_run_t - Allow systemd-hostnamed read the vsock device - Allow sysadm execute dmidecode using sudo - Allow sudodomain list files in /var - Allow setroubleshootd get attributes of all sysctls - Allow various services read and write z90crypt device - Allow nfsidmap connect to systemd-homed - Allow sandbox_x_client_t dbus chat with accountsd - Allow system_cronjob_t dbus chat with avahi_t - Allow staff_t the io_uring sqpoll permission - Allow staff_t use the io_uring API - Add support for secretmem anon inode * Thu May 16 2024 Adam Williamson <awilliam@redhat.com> - 40.18-3 - Correct some errors in the RPM macro changes from -2 * Mon May 06 2024 Zdenek Pytela <zpytela@redhat.com> - 40.18-2 - Update rpm configuration for the /var/run equivalency change * Mon May 06 2024 Zdenek Pytela <zpytela@redhat.com> - 40.18-1 - Allow virtqemud read vfio devices - Allow virtqemud get attributes of a tmpfs filesystem - Allow svirt_t read vm sysctls - Allow virtqemud create and unlink files in /etc/libvirt/ - Allow virtqemud get attributes of cifs files - Allow virtqemud get attributes of filesystems with extended attributes - Allow virtqemud get attributes of NFS filesystems - Allow virt_domain read and write usb devices conditionally - Allow virtstoraged use the io_uring API - Allow virtstoraged execute lvm programs in the lvm domain - Allow virtnodevd_t map /var/lib files - Allow svirt_tcg_t map svirt_image_t files - Allow abrt-dump-journal-core connect to systemd-homed - Allow abrt-dump-journal-core connect to systemd-machined - Allow sssd create and use io_uring - Allow selinux-relabel-generator create units dir - Allow dbus-broker read/write inherited user ttys * Thu Apr 25 2024 Zdenek Pytela <zpytela@redhat.com> - 40.17-1 - Define transitions for /run/libvirt/common and /run/libvirt/qemu - Allow systemd-sleep read raw disk data - Allow numad to trace processes in user namespace - Allow abrt-dump-journal-core connect to systemd-userdbd - Allow plymouthd read efivarfs files - Update the auth_dontaudit_read_passwd_file() interface - Label /dev/mmcblk0rpmb character device with removable_device_t - fix hibernate on btrfs swapfile (F40) - Allow nut to statfs() - Allow system dbusd service status systemd services - Allow systemd-timedated get the timemaster service status * Tue Apr 09 2024 Zdenek Pytela <zpytela@redhat.com> - 40.16-1 - Allow keyutils-dns-resolver connect to the system log service - Allow qemu-ga read vm sysctls - postfix: allow qmgr to delete mails in bounce/ directory - policy: support pidfs - Confine selinux-autorelabel-generator.sh - Allow logwatch_mail_t read/write to init over a unix stream socket - Allow logwatch read logind sessions files - files_dontaudit_getattr_tmpfs_files allowed the access and didn't dontaudit it - files_dontaudit_mounton_modules_object allowed the access and didn't dontaudit it - Allow NetworkManager the sys_ptrace capability in user namespace - dontaudit execmem for modemmanager - Allow dhcpcd use unix_stream_socket - Allow dhcpc read /run/netns files * Fri Mar 15 2024 Zdenek Pytela <zpytela@redhat.com> - 40.15-1 - Update mmap_rw_file_perms to include the lock permission - Allow plymouthd log during shutdown - Add logging_watch_all_log_dirs() and logging_watch_all_log_files() - Allow journalctl_t read filesystem sysctls - Allow cgred_t to get attributes of cgroup filesystems - Allow wdmd read hardware state information - Allow wdmd list the contents of the sysfs directories - Allow linuxptp configure phc2sys and chronyd over a unix domain socket - Allow sulogin relabel tty1 - Dontaudit sulogin the checkpoint_restore capability - Modify sudo_role_template() to allow getpgid - Remove incorrect "local" usage in varrun-convert.sh * Thu Mar 07 2024 Zdenek Pytela <zpytela@redhat.com> - 40.14-2 - Update varrun-convert.sh script to check for existing duplicate entries * Mon Feb 26 2024 Zdenek Pytela <zpytela@redhat.com> - 40.14-1 - Allow userdomain get attributes of files on an nsfs filesystem - Allow opafm create NFS files and directories - Allow virtqemud create and unlink files in /etc/libvirt/ - Allow virtqemud domain transition on swtpm execution - Add the swtpm.if interface file for interactions with other domains - Allow samba to have dac_override capability - systemd: allow sys_admin capability for systemd_notify_t - systemd: allow systemd_notify_t to send data to kernel_t datagram sockets - Allow thumb_t to watch and watch_reads mount_var_run_t - Allow krb5kdc_t map krb5kdc_principal_t files - Allow unprivileged confined user dbus chat with setroubleshoot - Allow login_userdomain map files in /var - Allow wireguard work with firewall-cmd - Differentiate between staff and sysadm when executing crontab with sudo - Add crontab_admin_domtrans interface - Allow abrt_t nnp domain transition to abrt_handle_event_t - Allow xdm_t to watch and watch_reads mount_var_run_t - Dontaudit subscription manager setfscreate and read file contexts - Don't audit crontab_domain write attempts to user home - Transition from sudodomains to crontab_t when executing crontab_exec_t - Add crontab_domtrans interface - Fix label of pseudoterminals created from sudodomain - Allow utempter_t use ptmx - Dontaudit rpmdb attempts to connect to sssd over a unix stream socket - Allow admin user read/write on fixed_disk_device_t * Mon Feb 12 2024 Zdenek Pytela <zpytela@redhat.com> - 40.13-1 - Only allow confined user domains to login locally without unconfined_login - Add userdom_spec_domtrans_confined_admin_users interface - Only allow admindomain to execute shell via ssh with ssh_sysadm_login - Add userdom_spec_domtrans_admin_users interface - Move ssh dyntrans to unconfined inside unconfined_login tunable policy - Update ssh_role_template() for user ssh-agent type - Allow init to inherit system DBus file descriptors - Allow init to inherit fds from syslogd - Allow any domain to inherit fds from rpm-ostree - Update afterburn policy - Allow init_t nnp domain transition to abrtd_t * Tue Feb 06 2024 Zdenek Pytela <zpytela@redhat.com> - 40.12-1 - Rename all /var/lock file context entries to /run/lock - Rename all /var/run file context entries to /run - Invert the "/var/run = /run" equivalency * Mon Feb 05 2024 Zdenek Pytela <zpytela@redhat.com> - 40.11-1 - Replace init domtrans rule for confined users to allow exec init - Update dbus_role_template() to allow user service status - Allow polkit status all systemd services - Allow setroubleshootd create and use inherited io_uring - Allow load_policy read and write generic ptys - Allow gpg manage rpm cache - Allow login_userdomain name_bind to howl and xmsg udp ports - Allow rules for confined users logged in plasma - Label /dev/iommu with iommu_device_t - Remove duplicate file context entries in /run - Dontaudit getty and plymouth the checkpoint_restore capability - Allow su domains write login records - Revert "Allow su domains write login records" - Allow login_userdomain delete session dbusd tmp socket files - Allow unix dgram sendto between exim processes - Allow su domains write login records - Allow smbd_t to watch user_home_dir_t if samba_enable_home_dirs is on * Wed Jan 24 2024 Zdenek Pytela <zpytela@redhat.com> - 40.10-1 - Allow chronyd-restricted read chronyd key files - Allow conntrackd_t to use bpf capability2 - Allow systemd-networkd manage its runtime socket files - Allow init_t nnp domain transition to colord_t - Allow polkit status systemd services - nova: Fix duplicate declarations - Allow httpd work with PrivateTmp - Add interfaces for watching and reading ifconfig_var_run_t - Allow collectd read raw fixed disk device - Allow collectd read udev pid files - Set correct label on /etc/pki/pki-tomcat/kra - Allow systemd domains watch system dbus pid socket files - Allow certmonger read network sysctls - Allow mdadm list stratisd data directories - Allow syslog to run unconfined scripts conditionally - Allow syslogd_t nnp_transition to syslogd_unconfined_script_t - Allow qatlib set attributes of vfio device files * Tue Jan 09 2024 Zdenek Pytela <zpytela@redhat.com> - 40.9-1 - Allow systemd-sleep set attributes of efivarfs files - Allow samba-dcerpcd read public files - Allow spamd_update_t the sys_ptrace capability in user namespace - Allow bluetooth devices work with alsa - Allow alsa get attributes filesystems with extended attributes * Tue Jan 02 2024 Yaakov Selkowitz <yselkowi@redhat.com> - 40.8-2 - Limit %selinux_requires to version, not release * Thu Dec 21 2023 Zdenek Pytela <zpytela@redhat.com> - 40.8-1 - Allow hypervkvp_t write access to NetworkManager_etc_rw_t - Add interface for write-only access to NetworkManager rw conf - Allow systemd-sleep send a message to syslog over a unix dgram socket - Allow init create and use netlink netfilter socket - Allow qatlib load kernel modules - Allow qatlib run lspci - Allow qatlib manage its private runtime socket files - Allow qatlib read/write vfio devices - Label /etc/redis.conf with redis_conf_t - Remove the lockdown-class rules from the policy - Allow init read all non-security socket files - Replace redundant dnsmasq pattern macros - Remove unneeded symlink perms in dnsmasq.if - Add additions to dnsmasq interface - Allow nvme_stas_t create and use netlink kobject uevent socket - Allow collectd connect to statsd port - Allow keepalived_t to use sys_ptrace of cap_userns - Allow dovecot_auth_t connect to postgresql using UNIX socket * Wed Dec 13 2023 Zdenek Pytela <zpytela@redhat.com> - 40.7-1 - Make named_zone_t and named_var_run_t a part of the mountpoint attribute - Allow sysadm execute traceroute in sysadm_t domain using sudo - Allow sysadm execute tcpdump in sysadm_t domain using sudo - Allow opafm search nfs directories - Add support for syslogd unconfined scripts - Allow gpsd use /dev/gnss devices - Allow gpg read rpm cache - Allow virtqemud additional permissions - Allow virtqemud manage its private lock files - Allow virtqemud use the io_uring api - Allow ddclient send e-mail notifications - Allow postfix_master_t map postfix data files - Allow init create and use vsock sockets - Allow thumb_t append to init unix domain stream sockets - Label /dev/vas with vas_device_t - Change domain_kernel_load_modules boolean to true - Create interface selinux_watch_config and add it to SELinux users * Tue Nov 28 2023 Zdenek Pytela <zpytela@redhat.com> - 40.6-1 - Add afterburn to modules-targeted-contrib.conf - Update cifs interfaces to include fs_search_auto_mountpoints() - Allow sudodomain read var auth files - Allow spamd_update_t read hardware state information - Allow virtnetworkd domain transition on tc command execution - Allow sendmail MTA connect to sendmail LDA - Allow auditd read all domains process state - Allow rsync read network sysctls - Add dhcpcd bpf capability to run bpf programs - Dontaudit systemd-hwdb dac_override capability - Allow systemd-sleep create efivarfs files * Tue Nov 14 2023 Zdenek Pytela <zpytela@redhat.com> - 40.5-1 - Allow map xserver_tmpfs_t files when xserver_clients_write_xshm is on - Allow graphical applications work in Wayland - Allow kdump work with PrivateTmp - Allow dovecot-auth work with PrivateTmp - Allow nfsd get attributes of all filesystems - Allow unconfined_domain_type use io_uring cmd on domain - ci: Only run Rawhide revdeps tests on the rawhide branch - Label /var/run/auditd.state as auditd_var_run_t - Allow fido-device-onboard (FDO) read the crack database - Allow ip an explicit domain transition to other domains - Label /usr/libexec/selinux/selinux-autorelabel with semanage_exec_t - Allow winbind_rpcd_t processes access when samba_export_all_* is on - Enable NetworkManager and dhclient to use initramfs-configured DHCP connection - Allow ntp to bind and connect to ntske port. - Allow system_mail_t manage exim spool files and dirs - Dontaudit keepalived setattr on keepalived_unconfined_script_exec_t - Label /run/pcsd.socket with cluster_var_run_t - ci: Run cockpit tests in PRs * Thu Oct 19 2023 Zdenek Pytela <zpytela@redhat.com> - 40.4-1 - Add map_read map_write to kernel_prog_run_bpf - Allow systemd-fstab-generator read all symlinks - Allow systemd-fstab-generator the dac_override capability - Allow rpcbind read network sysctls - Support using systemd containers - Allow sysadm_t to connect to iscsid using a unix domain stream socket - Add policy for coreos installer - Add coreos_installer to modules-targeted-contrib.conf * Tue Oct 17 2023 Zdenek Pytela <zpytela@redhat.com> - 40.3-1 - Add policy for nvme-stas - Confine systemd fstab,sysv,rc-local - Label /etc/aliases.lmdb with etc_aliases_t - Create policy for afterburn - Add nvme_stas to modules-targeted-contrib.conf - Add plans/tests.fmf * Tue Oct 10 2023 Zdenek Pytela <zpytela@redhat.com> - 40.2-1 - Add the virt_supplementary module to modules-targeted-contrib.conf - Make new virt drivers permissive - Split virt policy, introduce virt_supplementary module - Allow apcupsd cgi scripts read /sys - Merge pull request #1893 from WOnder93/more-early-boot-overlay-fixes - Allow kernel_t to manage and relabel all files - Add missing optional_policy() to files_relabel_all_files() * Tue Oct 03 2023 Zdenek Pytela <zpytela@redhat.com> - 40.1-1 - Allow named and ndc use the io_uring api - Deprecate common_anon_inode_perms usage - Improve default file context(None) of /var/lib/authselect/backups - Allow udev_t to search all directories with a filesystem type - Implement proper anon_inode support - Allow targetd write to the syslog pid sock_file - Add ipa_pki_retrieve_key_exec() interface - Allow kdumpctl_t to list all directories with a filesystem type - Allow udev additional permissions - Allow udev load kernel module - Allow sysadm_t to mmap modules_object_t files - Add the unconfined_read_files() and unconfined_list_dirs() interfaces - Set default file context of HOME_DIR/tmp/.* to <<none>> - Allow kernel_generic_helper_t to execute mount(1)
/usr/bin/macro-expander /usr/share/selinux/devel /usr/share/selinux/devel/Makefile /usr/share/selinux/devel/example.fc /usr/share/selinux/devel/example.if /usr/share/selinux/devel/example.te /usr/share/selinux/devel/html /usr/share/selinux/devel/html/index.html /usr/share/selinux/devel/html/style.css /usr/share/selinux/devel/include /usr/share/selinux/devel/include/Makefile /usr/share/selinux/devel/include/admin /usr/share/selinux/devel/include/admin.xml /usr/share/selinux/devel/include/admin/bootloader.if /usr/share/selinux/devel/include/admin/consoletype.if /usr/share/selinux/devel/include/admin/dmesg.if /usr/share/selinux/devel/include/admin/netutils.if /usr/share/selinux/devel/include/admin/su.if /usr/share/selinux/devel/include/admin/sudo.if /usr/share/selinux/devel/include/admin/usermanage.if /usr/share/selinux/devel/include/apps /usr/share/selinux/devel/include/apps.xml /usr/share/selinux/devel/include/apps/seunshare.if /usr/share/selinux/devel/include/build.conf /usr/share/selinux/devel/include/contrib /usr/share/selinux/devel/include/contrib.xml /usr/share/selinux/devel/include/contrib/abrt.if /usr/share/selinux/devel/include/contrib/accountsd.if /usr/share/selinux/devel/include/contrib/acct.if /usr/share/selinux/devel/include/contrib/afs.if /usr/share/selinux/devel/include/contrib/afterburn.if /usr/share/selinux/devel/include/contrib/aiccu.if /usr/share/selinux/devel/include/contrib/aide.if /usr/share/selinux/devel/include/contrib/aisexec.if /usr/share/selinux/devel/include/contrib/ajaxterm.if /usr/share/selinux/devel/include/contrib/alsa.if /usr/share/selinux/devel/include/contrib/amanda.if /usr/share/selinux/devel/include/contrib/amavis.if /usr/share/selinux/devel/include/contrib/amtu.if /usr/share/selinux/devel/include/contrib/anaconda.if /usr/share/selinux/devel/include/contrib/antivirus.if /usr/share/selinux/devel/include/contrib/apache.if /usr/share/selinux/devel/include/contrib/apcupsd.if /usr/share/selinux/devel/include/contrib/apm.if /usr/share/selinux/devel/include/contrib/apt.if /usr/share/selinux/devel/include/contrib/arpwatch.if /usr/share/selinux/devel/include/contrib/asterisk.if /usr/share/selinux/devel/include/contrib/authconfig.if /usr/share/selinux/devel/include/contrib/automount.if /usr/share/selinux/devel/include/contrib/avahi.if /usr/share/selinux/devel/include/contrib/awstats.if /usr/share/selinux/devel/include/contrib/backup.if /usr/share/selinux/devel/include/contrib/bacula.if /usr/share/selinux/devel/include/contrib/bcfg2.if /usr/share/selinux/devel/include/contrib/bind.if /usr/share/selinux/devel/include/contrib/bird.if /usr/share/selinux/devel/include/contrib/bitlbee.if /usr/share/selinux/devel/include/contrib/blkmapd.if /usr/share/selinux/devel/include/contrib/blueman.if /usr/share/selinux/devel/include/contrib/bluetooth.if /usr/share/selinux/devel/include/contrib/boinc.if /usr/share/selinux/devel/include/contrib/boltd.if /usr/share/selinux/devel/include/contrib/boothd.if /usr/share/selinux/devel/include/contrib/bootupd.if /usr/share/selinux/devel/include/contrib/brctl.if /usr/share/selinux/devel/include/contrib/brltty.if /usr/share/selinux/devel/include/contrib/bugzilla.if /usr/share/selinux/devel/include/contrib/bumblebee.if /usr/share/selinux/devel/include/contrib/cachefilesd.if /usr/share/selinux/devel/include/contrib/calamaris.if /usr/share/selinux/devel/include/contrib/callweaver.if /usr/share/selinux/devel/include/contrib/canna.if /usr/share/selinux/devel/include/contrib/ccs.if /usr/share/selinux/devel/include/contrib/cdrecord.if /usr/share/selinux/devel/include/contrib/certmaster.if /usr/share/selinux/devel/include/contrib/certmonger.if /usr/share/selinux/devel/include/contrib/certwatch.if /usr/share/selinux/devel/include/contrib/cfengine.if /usr/share/selinux/devel/include/contrib/cgroup.if /usr/share/selinux/devel/include/contrib/chrome.if /usr/share/selinux/devel/include/contrib/chronyd.if /usr/share/selinux/devel/include/contrib/cifsutils.if /usr/share/selinux/devel/include/contrib/cinder.if /usr/share/selinux/devel/include/contrib/cipe.if /usr/share/selinux/devel/include/contrib/clamav.if /usr/share/selinux/devel/include/contrib/clockspeed.if /usr/share/selinux/devel/include/contrib/clogd.if /usr/share/selinux/devel/include/contrib/cloudform.if /usr/share/selinux/devel/include/contrib/cmirrord.if /usr/share/selinux/devel/include/contrib/cobbler.if /usr/share/selinux/devel/include/contrib/cockpit.if /usr/share/selinux/devel/include/contrib/collectd.if /usr/share/selinux/devel/include/contrib/colord.if /usr/share/selinux/devel/include/contrib/comsat.if /usr/share/selinux/devel/include/contrib/condor.if /usr/share/selinux/devel/include/contrib/conman.if /usr/share/selinux/devel/include/contrib/conntrackd.if /usr/share/selinux/devel/include/contrib/consolekit.if /usr/share/selinux/devel/include/contrib/coreos_installer.if /usr/share/selinux/devel/include/contrib/corosync.if /usr/share/selinux/devel/include/contrib/couchdb.if /usr/share/selinux/devel/include/contrib/courier.if /usr/share/selinux/devel/include/contrib/cpucontrol.if /usr/share/selinux/devel/include/contrib/cpufreqselector.if /usr/share/selinux/devel/include/contrib/cpuplug.if /usr/share/selinux/devel/include/contrib/cron.if /usr/share/selinux/devel/include/contrib/ctdb.if /usr/share/selinux/devel/include/contrib/cups.if /usr/share/selinux/devel/include/contrib/cvs.if /usr/share/selinux/devel/include/contrib/cyphesis.if /usr/share/selinux/devel/include/contrib/cyrus.if /usr/share/selinux/devel/include/contrib/daemontools.if /usr/share/selinux/devel/include/contrib/dante.if /usr/share/selinux/devel/include/contrib/dbadm.if /usr/share/selinux/devel/include/contrib/dbskk.if /usr/share/selinux/devel/include/contrib/dbus.if /usr/share/selinux/devel/include/contrib/dcc.if /usr/share/selinux/devel/include/contrib/ddclient.if /usr/share/selinux/devel/include/contrib/ddcprobe.if /usr/share/selinux/devel/include/contrib/denyhosts.if /usr/share/selinux/devel/include/contrib/devicekit.if /usr/share/selinux/devel/include/contrib/dhcp.if /usr/share/selinux/devel/include/contrib/dictd.if /usr/share/selinux/devel/include/contrib/dirmngr.if /usr/share/selinux/devel/include/contrib/dirsrv-admin.if /usr/share/selinux/devel/include/contrib/dirsrv.if /usr/share/selinux/devel/include/contrib/distcc.if /usr/share/selinux/devel/include/contrib/djbdns.if /usr/share/selinux/devel/include/contrib/dkim.if /usr/share/selinux/devel/include/contrib/dmidecode.if /usr/share/selinux/devel/include/contrib/dnsmasq.if /usr/share/selinux/devel/include/contrib/dnssec.if /usr/share/selinux/devel/include/contrib/dovecot.if /usr/share/selinux/devel/include/contrib/dpkg.if /usr/share/selinux/devel/include/contrib/drbd.if /usr/share/selinux/devel/include/contrib/dspam.if /usr/share/selinux/devel/include/contrib/entropyd.if /usr/share/selinux/devel/include/contrib/evolution.if /usr/share/selinux/devel/include/contrib/exim.if /usr/share/selinux/devel/include/contrib/fail2ban.if /usr/share/selinux/devel/include/contrib/fcoe.if /usr/share/selinux/devel/include/contrib/fdo.if /usr/share/selinux/devel/include/contrib/fedoratp.if /usr/share/selinux/devel/include/contrib/fetchmail.if /usr/share/selinux/devel/include/contrib/finger.if /usr/share/selinux/devel/include/contrib/firewalld.if /usr/share/selinux/devel/include/contrib/firewallgui.if /usr/share/selinux/devel/include/contrib/firstboot.if /usr/share/selinux/devel/include/contrib/fprintd.if /usr/share/selinux/devel/include/contrib/freeipmi.if /usr/share/selinux/devel/include/contrib/freqset.if /usr/share/selinux/devel/include/contrib/ftp.if /usr/share/selinux/devel/include/contrib/fwupd.if /usr/share/selinux/devel/include/contrib/games.if /usr/share/selinux/devel/include/contrib/gatekeeper.if /usr/share/selinux/devel/include/contrib/gdomap.if /usr/share/selinux/devel/include/contrib/geoclue.if /usr/share/selinux/devel/include/contrib/git.if /usr/share/selinux/devel/include/contrib/gitosis.if /usr/share/selinux/devel/include/contrib/glance.if /usr/share/selinux/devel/include/contrib/glusterd.if /usr/share/selinux/devel/include/contrib/gnome.if /usr/share/selinux/devel/include/contrib/gnomeclock.if /usr/share/selinux/devel/include/contrib/gpg.if /usr/share/selinux/devel/include/contrib/gpm.if /usr/share/selinux/devel/include/contrib/gpsd.if /usr/share/selinux/devel/include/contrib/gssproxy.if /usr/share/selinux/devel/include/contrib/hadoop.if /usr/share/selinux/devel/include/contrib/hddtemp.if /usr/share/selinux/devel/include/contrib/hostapd.if /usr/share/selinux/devel/include/contrib/howl.if /usr/share/selinux/devel/include/contrib/hsqldb.if /usr/share/selinux/devel/include/contrib/hwloc.if /usr/share/selinux/devel/include/contrib/hypervkvp.if /usr/share/selinux/devel/include/contrib/i18n_input.if /usr/share/selinux/devel/include/contrib/ibacm.if /usr/share/selinux/devel/include/contrib/ica.if /usr/share/selinux/devel/include/contrib/icecast.if /usr/share/selinux/devel/include/contrib/ifplugd.if /usr/share/selinux/devel/include/contrib/imaze.if /usr/share/selinux/devel/include/contrib/inetd.if /usr/share/selinux/devel/include/contrib/inn.if /usr/share/selinux/devel/include/contrib/insights_client.if /usr/share/selinux/devel/include/contrib/iodine.if /usr/share/selinux/devel/include/contrib/iotop.if /usr/share/selinux/devel/include/contrib/ipa.if /usr/share/selinux/devel/include/contrib/ipmievd.if /usr/share/selinux/devel/include/contrib/irc.if /usr/share/selinux/devel/include/contrib/ircd.if /usr/share/selinux/devel/include/contrib/irqbalance.if /usr/share/selinux/devel/include/contrib/iscsi.if /usr/share/selinux/devel/include/contrib/isns.if /usr/share/selinux/devel/include/contrib/jabber.if /usr/share/selinux/devel/include/contrib/java.if /usr/share/selinux/devel/include/contrib/jetty.if /usr/share/selinux/devel/include/contrib/jockey.if /usr/share/selinux/devel/include/contrib/journalctl.if /usr/share/selinux/devel/include/contrib/kafs.if /usr/share/selinux/devel/include/contrib/kdump.if /usr/share/selinux/devel/include/contrib/kdumpgui.if /usr/share/selinux/devel/include/contrib/keepalived.if /usr/share/selinux/devel/include/contrib/kerberos.if /usr/share/selinux/devel/include/contrib/kerneloops.if /usr/share/selinux/devel/include/contrib/keyboardd.if /usr/share/selinux/devel/include/contrib/keystone.if /usr/share/selinux/devel/include/contrib/keyutils.if /usr/share/selinux/devel/include/contrib/kismet.if /usr/share/selinux/devel/include/contrib/kmscon.if /usr/share/selinux/devel/include/contrib/kpatch.if /usr/share/selinux/devel/include/contrib/ksmtuned.if /usr/share/selinux/devel/include/contrib/ktalk.if /usr/share/selinux/devel/include/contrib/l2tp.if /usr/share/selinux/devel/include/contrib/ldap.if /usr/share/selinux/devel/include/contrib/lightsquid.if /usr/share/selinux/devel/include/contrib/likewise.if /usr/share/selinux/devel/include/contrib/linuxptp.if /usr/share/selinux/devel/include/contrib/lircd.if /usr/share/selinux/devel/include/contrib/livecd.if /usr/share/selinux/devel/include/contrib/lldpad.if /usr/share/selinux/devel/include/contrib/loadkeys.if /usr/share/selinux/devel/include/contrib/lockdev.if /usr/share/selinux/devel/include/contrib/logrotate.if /usr/share/selinux/devel/include/contrib/logwatch.if /usr/share/selinux/devel/include/contrib/lpd.if /usr/share/selinux/devel/include/contrib/lsm.if /usr/share/selinux/devel/include/contrib/lttng-tools.if /usr/share/selinux/devel/include/contrib/mailman.if /usr/share/selinux/devel/include/contrib/mailscanner.if /usr/share/selinux/devel/include/contrib/man2html.if /usr/share/selinux/devel/include/contrib/mandb.if /usr/share/selinux/devel/include/contrib/mcelog.if /usr/share/selinux/devel/include/contrib/mediawiki.if /usr/share/selinux/devel/include/contrib/memcached.if /usr/share/selinux/devel/include/contrib/milter.if /usr/share/selinux/devel/include/contrib/minidlna.if /usr/share/selinux/devel/include/contrib/minissdpd.if /usr/share/selinux/devel/include/contrib/mip6d.if /usr/share/selinux/devel/include/contrib/mirrormanager.if /usr/share/selinux/devel/include/contrib/mock.if /usr/share/selinux/devel/include/contrib/modemmanager.if /usr/share/selinux/devel/include/contrib/mojomojo.if /usr/share/selinux/devel/include/contrib/mon_statd.if /usr/share/selinux/devel/include/contrib/mongodb.if /usr/share/selinux/devel/include/contrib/mono.if /usr/share/selinux/devel/include/contrib/monop.if /usr/share/selinux/devel/include/contrib/motion.if /usr/share/selinux/devel/include/contrib/mozilla.if /usr/share/selinux/devel/include/contrib/mpd.if /usr/share/selinux/devel/include/contrib/mplayer.if /usr/share/selinux/devel/include/contrib/mptcpd.if /usr/share/selinux/devel/include/contrib/mrtg.if /usr/share/selinux/devel/include/contrib/mta.if /usr/share/selinux/devel/include/contrib/munin.if /usr/share/selinux/devel/include/contrib/mysql.if /usr/share/selinux/devel/include/contrib/mythtv.if /usr/share/selinux/devel/include/contrib/naemon.if /usr/share/selinux/devel/include/contrib/nagios.if /usr/share/selinux/devel/include/contrib/namespace.if /usr/share/selinux/devel/include/contrib/ncftool.if /usr/share/selinux/devel/include/contrib/nessus.if /usr/share/selinux/devel/include/contrib/networkmanager.if /usr/share/selinux/devel/include/contrib/ninfod.if /usr/share/selinux/devel/include/contrib/nis.if /usr/share/selinux/devel/include/contrib/nova.if /usr/share/selinux/devel/include/contrib/nscd.if /usr/share/selinux/devel/include/contrib/nsd.if /usr/share/selinux/devel/include/contrib/nslcd.if /usr/share/selinux/devel/include/contrib/ntop.if /usr/share/selinux/devel/include/contrib/ntp.if /usr/share/selinux/devel/include/contrib/numad.if /usr/share/selinux/devel/include/contrib/nut.if /usr/share/selinux/devel/include/contrib/nvme_stas.if /usr/share/selinux/devel/include/contrib/nx.if /usr/share/selinux/devel/include/contrib/oav.if /usr/share/selinux/devel/include/contrib/obex.if /usr/share/selinux/devel/include/contrib/oddjob.if /usr/share/selinux/devel/include/contrib/oident.if /usr/share/selinux/devel/include/contrib/opafm.if /usr/share/selinux/devel/include/contrib/openca.if /usr/share/selinux/devel/include/contrib/openct.if /usr/share/selinux/devel/include/contrib/opendnssec.if /usr/share/selinux/devel/include/contrib/openfortivpn.if /usr/share/selinux/devel/include/contrib/openhpid.if /usr/share/selinux/devel/include/contrib/openshift-origin.if /usr/share/selinux/devel/include/contrib/openshift.if /usr/share/selinux/devel/include/contrib/opensm.if /usr/share/selinux/devel/include/contrib/openvpn.if /usr/share/selinux/devel/include/contrib/openvswitch.if /usr/share/selinux/devel/include/contrib/openwsman.if /usr/share/selinux/devel/include/contrib/oracleasm.if /usr/share/selinux/devel/include/contrib/osad.if /usr/share/selinux/devel/include/contrib/pacemaker.if /usr/share/selinux/devel/include/contrib/pads.if /usr/share/selinux/devel/include/contrib/passenger.if /usr/share/selinux/devel/include/contrib/passt.if /usr/share/selinux/devel/include/contrib/pcmcia.if /usr/share/selinux/devel/include/contrib/pcp.if /usr/share/selinux/devel/include/contrib/pcscd.if /usr/share/selinux/devel/include/contrib/pdns.if /usr/share/selinux/devel/include/contrib/pegasus.if /usr/share/selinux/devel/include/contrib/perdition.if /usr/share/selinux/devel/include/contrib/pesign.if /usr/share/selinux/devel/include/contrib/pingd.if /usr/share/selinux/devel/include/contrib/piranha.if /usr/share/selinux/devel/include/contrib/pkcs.if /usr/share/selinux/devel/include/contrib/pkcs11proxyd.if /usr/share/selinux/devel/include/contrib/pki.if /usr/share/selinux/devel/include/contrib/plymouthd.if /usr/share/selinux/devel/include/contrib/podsleuth.if /usr/share/selinux/devel/include/contrib/policykit.if /usr/share/selinux/devel/include/contrib/polipo.if /usr/share/selinux/devel/include/contrib/portage.if /usr/share/selinux/devel/include/contrib/portmap.if /usr/share/selinux/devel/include/contrib/portreserve.if /usr/share/selinux/devel/include/contrib/portslave.if /usr/share/selinux/devel/include/contrib/postfix.if /usr/share/selinux/devel/include/contrib/postfixpolicyd.if /usr/share/selinux/devel/include/contrib/postgrey.if /usr/share/selinux/devel/include/contrib/ppp.if /usr/share/selinux/devel/include/contrib/prelink.if /usr/share/selinux/devel/include/contrib/prelude.if /usr/share/selinux/devel/include/contrib/privoxy.if /usr/share/selinux/devel/include/contrib/procmail.if /usr/share/selinux/devel/include/contrib/prosody.if /usr/share/selinux/devel/include/contrib/psad.if /usr/share/selinux/devel/include/contrib/ptchown.if /usr/share/selinux/devel/include/contrib/publicfile.if /usr/share/selinux/devel/include/contrib/pulseaudio.if /usr/share/selinux/devel/include/contrib/puppet.if /usr/share/selinux/devel/include/contrib/pwauth.if /usr/share/selinux/devel/include/contrib/pxe.if /usr/share/selinux/devel/include/contrib/pyzor.if /usr/share/selinux/devel/include/contrib/qatlib.if /usr/share/selinux/devel/include/contrib/qemu.if /usr/share/selinux/devel/include/contrib/qmail.if /usr/share/selinux/devel/include/contrib/qpid.if /usr/share/selinux/devel/include/contrib/quantum.if /usr/share/selinux/devel/include/contrib/quota.if /usr/share/selinux/devel/include/contrib/rabbitmq.if /usr/share/selinux/devel/include/contrib/radius.if /usr/share/selinux/devel/include/contrib/radvd.if /usr/share/selinux/devel/include/contrib/raid.if /usr/share/selinux/devel/include/contrib/rasdaemon.if /usr/share/selinux/devel/include/contrib/razor.if /usr/share/selinux/devel/include/contrib/rdisc.if /usr/share/selinux/devel/include/contrib/readahead.if /usr/share/selinux/devel/include/contrib/realmd.if /usr/share/selinux/devel/include/contrib/redis.if /usr/share/selinux/devel/include/contrib/remotelogin.if /usr/share/selinux/devel/include/contrib/resmgr.if /usr/share/selinux/devel/include/contrib/rgmanager.if /usr/share/selinux/devel/include/contrib/rhcd.if /usr/share/selinux/devel/include/contrib/rhcs.if /usr/share/selinux/devel/include/contrib/rhev.if /usr/share/selinux/devel/include/contrib/rhgb.if /usr/share/selinux/devel/include/contrib/rhnsd.if /usr/share/selinux/devel/include/contrib/rhsmcertd.if /usr/share/selinux/devel/include/contrib/ricci.if /usr/share/selinux/devel/include/contrib/rkhunter.if /usr/share/selinux/devel/include/contrib/rkt.if /usr/share/selinux/devel/include/contrib/rlogin.if /usr/share/selinux/devel/include/contrib/rngd.if /usr/share/selinux/devel/include/contrib/rolekit.if /usr/share/selinux/devel/include/contrib/roundup.if /usr/share/selinux/devel/include/contrib/rpc.if /usr/share/selinux/devel/include/contrib/rpcbind.if /usr/share/selinux/devel/include/contrib/rpm.if /usr/share/selinux/devel/include/contrib/rrdcached.if /usr/share/selinux/devel/include/contrib/rshd.if /usr/share/selinux/devel/include/contrib/rshim.if /usr/share/selinux/devel/include/contrib/rssh.if /usr/share/selinux/devel/include/contrib/rsync.if /usr/share/selinux/devel/include/contrib/rtas.if /usr/share/selinux/devel/include/contrib/rtkit.if /usr/share/selinux/devel/include/contrib/rwho.if /usr/share/selinux/devel/include/contrib/samba.if /usr/share/selinux/devel/include/contrib/sambagui.if /usr/share/selinux/devel/include/contrib/samhain.if /usr/share/selinux/devel/include/contrib/sandbox.if /usr/share/selinux/devel/include/contrib/sandboxX.if /usr/share/selinux/devel/include/contrib/sanlock.if /usr/share/selinux/devel/include/contrib/sap.if /usr/share/selinux/devel/include/contrib/sasl.if /usr/share/selinux/devel/include/contrib/sbd.if /usr/share/selinux/devel/include/contrib/sblim.if /usr/share/selinux/devel/include/contrib/screen.if /usr/share/selinux/devel/include/contrib/sectoolm.if /usr/share/selinux/devel/include/contrib/sendmail.if /usr/share/selinux/devel/include/contrib/sensord.if /usr/share/selinux/devel/include/contrib/setroubleshoot.if /usr/share/selinux/devel/include/contrib/sge.if /usr/share/selinux/devel/include/contrib/shorewall.if /usr/share/selinux/devel/include/contrib/shutdown.if /usr/share/selinux/devel/include/contrib/slocate.if /usr/share/selinux/devel/include/contrib/slpd.if /usr/share/selinux/devel/include/contrib/slrnpull.if /usr/share/selinux/devel/include/contrib/smartmon.if /usr/share/selinux/devel/include/contrib/smokeping.if /usr/share/selinux/devel/include/contrib/smoltclient.if /usr/share/selinux/devel/include/contrib/smsd.if /usr/share/selinux/devel/include/contrib/smstools.if /usr/share/selinux/devel/include/contrib/snapper.if /usr/share/selinux/devel/include/contrib/snmp.if /usr/share/selinux/devel/include/contrib/snort.if /usr/share/selinux/devel/include/contrib/sosreport.if /usr/share/selinux/devel/include/contrib/soundserver.if /usr/share/selinux/devel/include/contrib/spamassassin.if /usr/share/selinux/devel/include/contrib/speech-dispatcher.if /usr/share/selinux/devel/include/contrib/squid.if /usr/share/selinux/devel/include/contrib/sslh.if /usr/share/selinux/devel/include/contrib/sssd.if /usr/share/selinux/devel/include/contrib/stalld.if /usr/share/selinux/devel/include/contrib/stapserver.if /usr/share/selinux/devel/include/contrib/stratisd.if /usr/share/selinux/devel/include/contrib/stunnel.if /usr/share/selinux/devel/include/contrib/svnserve.if /usr/share/selinux/devel/include/contrib/swift.if /usr/share/selinux/devel/include/contrib/swtpm.if /usr/share/selinux/devel/include/contrib/sxid.if /usr/share/selinux/devel/include/contrib/sysstat.if /usr/share/selinux/devel/include/contrib/tangd.if /usr/share/selinux/devel/include/contrib/targetd.if /usr/share/selinux/devel/include/contrib/tcpd.if /usr/share/selinux/devel/include/contrib/tcsd.if /usr/share/selinux/devel/include/contrib/telepathy.if /usr/share/selinux/devel/include/contrib/telnet.if /usr/share/selinux/devel/include/contrib/tftp.if /usr/share/selinux/devel/include/contrib/tgtd.if /usr/share/selinux/devel/include/contrib/thin.if /usr/share/selinux/devel/include/contrib/thumb.if /usr/share/selinux/devel/include/contrib/thunderbird.if /usr/share/selinux/devel/include/contrib/timedatex.if /usr/share/selinux/devel/include/contrib/timidity.if /usr/share/selinux/devel/include/contrib/tlp.if /usr/share/selinux/devel/include/contrib/tmpreaper.if /usr/share/selinux/devel/include/contrib/tomcat.if /usr/share/selinux/devel/include/contrib/tor.if /usr/share/selinux/devel/include/contrib/transproxy.if /usr/share/selinux/devel/include/contrib/tripwire.if /usr/share/selinux/devel/include/contrib/tuned.if /usr/share/selinux/devel/include/contrib/tvtime.if /usr/share/selinux/devel/include/contrib/tzdata.if /usr/share/selinux/devel/include/contrib/ucspitcp.if /usr/share/selinux/devel/include/contrib/ulogd.if /usr/share/selinux/devel/include/contrib/uml.if /usr/share/selinux/devel/include/contrib/updfstab.if /usr/share/selinux/devel/include/contrib/uptime.if /usr/share/selinux/devel/include/contrib/usbmodules.if /usr/share/selinux/devel/include/contrib/usbmuxd.if /usr/share/selinux/devel/include/contrib/userhelper.if /usr/share/selinux/devel/include/contrib/usernetctl.if /usr/share/selinux/devel/include/contrib/uucp.if /usr/share/selinux/devel/include/contrib/uuidd.if /usr/share/selinux/devel/include/contrib/uwimap.if /usr/share/selinux/devel/include/contrib/varnishd.if /usr/share/selinux/devel/include/contrib/vbetool.if /usr/share/selinux/devel/include/contrib/vdagent.if /usr/share/selinux/devel/include/contrib/vhostmd.if /usr/share/selinux/devel/include/contrib/virt.if /usr/share/selinux/devel/include/contrib/virt_supplementary.if /usr/share/selinux/devel/include/contrib/vlock.if /usr/share/selinux/devel/include/contrib/vmtools.if /usr/share/selinux/devel/include/contrib/vmware.if /usr/share/selinux/devel/include/contrib/vnstatd.if /usr/share/selinux/devel/include/contrib/vpn.if /usr/share/selinux/devel/include/contrib/w3c.if /usr/share/selinux/devel/include/contrib/watchdog.if /usr/share/selinux/devel/include/contrib/wdmd.if /usr/share/selinux/devel/include/contrib/webadm.if /usr/share/selinux/devel/include/contrib/webalizer.if /usr/share/selinux/devel/include/contrib/wine.if /usr/share/selinux/devel/include/contrib/wireguard.if /usr/share/selinux/devel/include/contrib/wireshark.if /usr/share/selinux/devel/include/contrib/wm.if /usr/share/selinux/devel/include/contrib/xen.if /usr/share/selinux/devel/include/contrib/xfs.if /usr/share/selinux/devel/include/contrib/xscreensaver.if /usr/share/selinux/devel/include/contrib/zabbix.if /usr/share/selinux/devel/include/contrib/zarafa.if /usr/share/selinux/devel/include/contrib/zebra.if /usr/share/selinux/devel/include/contrib/zoneminder.if /usr/share/selinux/devel/include/contrib/zosremote.if /usr/share/selinux/devel/include/global_booleans.xml /usr/share/selinux/devel/include/global_tunables.xml /usr/share/selinux/devel/include/kernel /usr/share/selinux/devel/include/kernel.xml /usr/share/selinux/devel/include/kernel/corecommands.if /usr/share/selinux/devel/include/kernel/corenetwork.if /usr/share/selinux/devel/include/kernel/devices.if /usr/share/selinux/devel/include/kernel/domain.if /usr/share/selinux/devel/include/kernel/files.if /usr/share/selinux/devel/include/kernel/filesystem.if /usr/share/selinux/devel/include/kernel/kernel.if /usr/share/selinux/devel/include/kernel/mcs.if /usr/share/selinux/devel/include/kernel/mls.if /usr/share/selinux/devel/include/kernel/selinux.if /usr/share/selinux/devel/include/kernel/storage.if /usr/share/selinux/devel/include/kernel/terminal.if /usr/share/selinux/devel/include/kernel/ubac.if /usr/share/selinux/devel/include/kernel/unlabelednet.if /usr/share/selinux/devel/include/roles /usr/share/selinux/devel/include/roles.xml /usr/share/selinux/devel/include/roles/auditadm.if /usr/share/selinux/devel/include/roles/guest.if /usr/share/selinux/devel/include/roles/logadm.if /usr/share/selinux/devel/include/roles/secadm.if /usr/share/selinux/devel/include/roles/staff.if /usr/share/selinux/devel/include/roles/sysadm.if /usr/share/selinux/devel/include/roles/sysadm_secadm.if /usr/share/selinux/devel/include/roles/unconfineduser.if /usr/share/selinux/devel/include/roles/unprivuser.if /usr/share/selinux/devel/include/roles/xguest.if /usr/share/selinux/devel/include/services /usr/share/selinux/devel/include/services.xml /usr/share/selinux/devel/include/services/postgresql.if /usr/share/selinux/devel/include/services/ssh.if /usr/share/selinux/devel/include/services/xserver.if /usr/share/selinux/devel/include/support /usr/share/selinux/devel/include/support/all_perms.spt /usr/share/selinux/devel/include/support/divert.m4 /usr/share/selinux/devel/include/support/file_patterns.spt /usr/share/selinux/devel/include/support/ipc_patterns.spt /usr/share/selinux/devel/include/support/loadable_module.spt /usr/share/selinux/devel/include/support/misc_macros.spt /usr/share/selinux/devel/include/support/misc_patterns.spt /usr/share/selinux/devel/include/support/mls_mcs_macros.spt /usr/share/selinux/devel/include/support/obj_perm_sets.spt /usr/share/selinux/devel/include/support/policy.dtd /usr/share/selinux/devel/include/support/segenxml.py /usr/share/selinux/devel/include/support/undivert.m4 /usr/share/selinux/devel/include/system /usr/share/selinux/devel/include/system.xml /usr/share/selinux/devel/include/system/application.if /usr/share/selinux/devel/include/system/authlogin.if /usr/share/selinux/devel/include/system/clock.if /usr/share/selinux/devel/include/system/fstools.if /usr/share/selinux/devel/include/system/getty.if /usr/share/selinux/devel/include/system/hostname.if /usr/share/selinux/devel/include/system/init.if /usr/share/selinux/devel/include/system/ipsec.if /usr/share/selinux/devel/include/system/iptables.if /usr/share/selinux/devel/include/system/libraries.if /usr/share/selinux/devel/include/system/locallogin.if /usr/share/selinux/devel/include/system/logging.if /usr/share/selinux/devel/include/system/lvm.if /usr/share/selinux/devel/include/system/miscfiles.if /usr/share/selinux/devel/include/system/modutils.if /usr/share/selinux/devel/include/system/mount.if /usr/share/selinux/devel/include/system/netlabel.if /usr/share/selinux/devel/include/system/selinuxutil.if /usr/share/selinux/devel/include/system/setrans.if /usr/share/selinux/devel/include/system/sysnetwork.if /usr/share/selinux/devel/include/system/systemd.if /usr/share/selinux/devel/include/system/udev.if /usr/share/selinux/devel/include/system/unconfined.if /usr/share/selinux/devel/include/system/userdomain.if /usr/share/selinux/devel/policy.dtd /usr/share/selinux/devel/policy.xml /var/lib/sepolgen/interface_info
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Jul 13 00:27:53 2024