معرفی شرکت ها


selinux-policy-devel-38.1.51-1.el9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy development files
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 10-stream
مخزن Centos AppStream noarch
نام بسته selinux-policy-devel
نام فایل بسته selinux-policy-devel-38.1.51-1.el9.noarch.rpm
نسخه بسته 38.1.51
انتشار بسته 1.el9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed Jan 15 23
هاست سازنده aarch64-02.stream.rdu2.redhat.com
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 1.5M
حجم نصب 22.502M
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-devel-38.1.22-1.el9.noarch.rpm 38.1.22 noarch CentOS AppStream
selinux-policy-devel-38.1.23-1.el9.noarch.rpm 38.1.23 noarch CentOS AppStream
selinux-policy-devel-38.1.24-1.el9.noarch.rpm 38.1.24 noarch CentOS AppStream
selinux-policy-devel-38.1.25-1.el9.noarch.rpm 38.1.25 noarch CentOS AppStream
selinux-policy-devel-38.1.26-1.el9.noarch.rpm 38.1.26 noarch CentOS AppStream
selinux-policy-devel-38.1.27-1.el9.noarch.rpm 38.1.27 noarch CentOS AppStream
selinux-policy-devel-38.1.29-1.el9.noarch.rpm 38.1.29 noarch CentOS AppStream
selinux-policy-devel-38.1.30-1.el9.noarch.rpm 38.1.30 noarch CentOS AppStream
selinux-policy-devel-38.1.31-1.el9.noarch.rpm 38.1.31 noarch CentOS AppStream
selinux-policy-devel-38.1.33-1.el9.noarch.rpm 38.1.33 noarch CentOS AppStream
selinux-policy-devel-38.1.48-1.el9.noarch.rpm 38.1.48 noarch CentOS AppStream
selinux-policy-devel-38.1.49-1.el9.noarch.rpm 38.1.49 noarch CentOS AppStream
selinux-policy-devel-38.1.50-1.el9.noarch.rpm 38.1.50 noarch CentOS AppStream
selinux-policy-devel-38.1.53-1.el9.noarch.rpm 38.1.53 noarch CentOS AppStream
selinux-policy-devel-40.13.17-1.el10.noarch.rpm 40.13.17 noarch CentOS AppStream
selinux-policy-devel-40.13.19-1.el10.noarch.rpm 40.13.19 noarch CentOS AppStream
selinux-policy-devel-40.13.21-1.el10.noarch.rpm 40.13.21 noarch CentOS AppStream
selinux-policy-devel-40.13.22-1.el10.noarch.rpm 40.13.22 noarch CentOS AppStream
selinux-policy-devel-40.13.24-1.el10.noarch.rpm 40.13.24 noarch CentOS AppStream


نیازمندی

مقدار نام
- /bin/sh
- /usr/bin/bash
- /usr/bin/make
>= 3.2 checkpolicy
- m4
>= 3.4-1 policycoreutils-devel
= 38.1.51-1.el9 selinux-policy
= 38.1.51-1.el9 selinux-policy


ارائه دهنده

مقدار نام
= 38.1.51-1.el9 selinux-policy-devel


نحوه نصب


نصب پکیج rpm selinux-policy-devel:

    None


فایل ها

مسیرها
/usr/bin/macro-expander
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/NetworkManager.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_chronyc.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_cloud.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_console.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_custom.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_ddclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dhclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dnssec.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_iscsid.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_sendmail.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_tlp.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_winbind.html
/usr/share/selinux/devel/html/NetworkManager_priv_helper.html
/usr/share/selinux/devel/html/NetworkManager_ssh.html
/usr/share/selinux/devel/html/abrt.html
/usr/share/selinux/devel/html/abrt_dump_oops.html
/usr/share/selinux/devel/html/abrt_handle_event.html
/usr/share/selinux/devel/html/abrt_helper.html
/usr/share/selinux/devel/html/abrt_retrace_coredump.html
/usr/share/selinux/devel/html/abrt_retrace_worker.html
/usr/share/selinux/devel/html/abrt_upload_watch.html
/usr/share/selinux/devel/html/abrt_watch_log.html
/usr/share/selinux/devel/html/accountsd.html
/usr/share/selinux/devel/html/acct.html
/usr/share/selinux/devel/html/admin_crontab.html
/usr/share/selinux/devel/html/afs.html
/usr/share/selinux/devel/html/afs_bosserver.html
/usr/share/selinux/devel/html/afs_fsserver.html
/usr/share/selinux/devel/html/afs_kaserver.html
/usr/share/selinux/devel/html/afs_ptserver.html
/usr/share/selinux/devel/html/afs_vlserver.html
/usr/share/selinux/devel/html/afterburn.html
/usr/share/selinux/devel/html/aiccu.html
/usr/share/selinux/devel/html/aide.html
/usr/share/selinux/devel/html/ajaxterm.html
/usr/share/selinux/devel/html/ajaxterm_ssh.html
/usr/share/selinux/devel/html/alsa.html
/usr/share/selinux/devel/html/amanda.html
/usr/share/selinux/devel/html/amanda_recover.html
/usr/share/selinux/devel/html/amtu.html
/usr/share/selinux/devel/html/anaconda.html
/usr/share/selinux/devel/html/anon_sftpd.html
... and 1380 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2025-01-15

Allow rsyslog read systemd-logind session files
73839
Allow samba-bgqd connect to cupsd over an unix domain stream socket
72860
Allow svirt_t read sysfs files
70839
Allow xdm dbus chat with power-profiles-daemon
61117
Update power-profiles-daemon policy
61117
Confine power-profiles-daemon
61117
Allow virtqemud domain transition to nbdkit
56029
Add nbdkit interfaces defined conditionally
56029
Confine the switcheroo-control service
24268

2024-12-13

Allow auditctl signal auditd
68969
Fix the cups_read_pid_files() interface to use read_files_pattern
69517
Dontaudit systemd-coredump the sys_resource capability
46339
Allow rpcd read network sysctls
1558
Allow irqbalance setpcap capability in the user namespace
69564
Allow traceroute_t bind rawip sockets to unreserved ports
54561
Allow svirt_t the sys_rawio capability
56955
56988
Exclude container-selinux manpage from selinux-policy-doc
69916

2024-12-06

Update virtlogd policy
69433
Allow svirt_t the sys_rawio capability
56955
Allow qemu-ga the dac_override and dac_read_search capabilities
52476
Allow ip the setexec permission
62923
Allow alsa get attributes filesystems with extended attributes
61472
Allow bacula execute container in the container domain
21168
Allow httpd get attributes of dirsrv unit files
46808
Update samba-bgqd policy
69517
Allow samba-bgqd read cups config files
69517
Update policy for samba-bgqd
69517
Update bootupd policy for the removing-state-file test
66584
Allow qatlib search the content of the kernel debugging filesystem
53864
Allow qatlib connect to systemd-machined over a unix socket
53864
Update qatlib policy for v24.02 with new features
53864

2024-11-12

Revert "Allow unconfined_t execute kmod in the kmod domain"
65008
Add policy for /usr/libexec/samba/samba-bgqd
53124

2024-10-23

Label /etc/sysctl.d and /run/sysctl.d with system_conf_t
56988
Allow lldpad create and use netlink_generic_socket
61832
Allow unconfined_t execute kmod in the kmod domain
54710
Allow confined users r/w to screen unix stream socket
50379
Label /root/.screenrc and /root/.tmux.conf with screen_home_t
50375
Allow iio-sensor-proxy the bpf capability
17346

2024-10-11

Rebuild

2024-10-10

Label /run/modprobe.d with modules_conf_t
61453
Allow boothd connect to kernel over a unix socket
57104
Allow boothd connect to systemd-userdbd over a unix socket
57104
Additional updates stalld policy for bpf usage
57075
Update stalld policy for bpf usage
57075
Allow ptp4l the sys_admin capability
55133
Label /dev/hfi1_[0-9]+ devices
54996
Confine iio-sensor-proxy
17346

2024-09-16

Rebuild
55414

2024-09-04

Rebuild
55414

2024-08-29

Allow setsebool_t relabel selinux data files
55414

2024-08-12

Allow coreos-installer-generator work with partitions
38614
Label /etc/mdadm.conf.d with mdadm_conf_t
38614
Change file context specification to /var/run/metadata
49735
Allow initrc_t transition to passwd_t
17404
systemd: allow systemd_notify_t to send data to kernel_t datagram sockets
25514
systemd: allow sys_admin capability for systemd_notify_t
25514
Change systemd-network-generator transition to include class file
47033
Allow sshd_keygen_t connect to userdbd over a unix stream socket
47033

2024-07-31

Allow rhsmcertd read/write access to /dev/papr-sysparm
49599
Label /dev/papr-sysparm and /dev/papr-vpd
49599
Allow rhsmcertd read, write, and map ica tmpfs files
50926
Update afterburn file transition policy
49735
Label /run/metadata with afterburn_runtime_t
49735
Allow afterburn list ssh home directory
49735
Support SGX devices
50922
Allow systemd-pstore send a message to syslogd over a unix domain
45528
Allow postfix_domain map postfix_etc_t files
46332
Allow microcode create /sys/devices/system/cpu/microcode/reload
26821
Allow svirt_tcg_t map svirt_image_t files
27141
Allow systemd-hostnamed shut down nscd
45033
Allow postfix_domain connect to postgresql over a unix socket
6776

2024-07-18

Label samba certificates with samba_cert_t
25724
Allow systemd-coredumpd the sys_chroot capability
45245
Allow svirt_tcg_t read vm sysctls
27141
Label /usr/sbin/samba-gpupdate with samba_gpupdate_exec_t
25724
Label /var/run/coreos-installer-reboot with coreos_installer_var_run_t
38614
Allow coreos-installer add systemd unit file links
38614

2024-07-07

Differentiate between staff and sysadm when executing crontab with sudo
31888
Label /usr/bin/samba-gpupdate with samba_gpupdate_exec_t
25724
Allow unconfined_service_t transition to passwd_t
17404
Allow sbd to trace processes in user namespace
44680
Allow systemd-coredumpd sys_admin and sys_resource capabilities
45245
Label /usr/lib/node_modules/npm/bin with bin_t
36587
Support /var is empty
29331
Allow timemaster write to sysfs files
28777
Don't audit crontab_domain write attempts to user home
31888
Transition from sudodomains to crontab_t when executing crontab_exec_t
31888
Fix label of pseudoterminals created from sudodomain
31888

2024-06-18

Allow systemd-coredump read nsfs files
39937
Allow login_userdomain execute systemd-tmpfiles in the caller domain
40374
Allow ptp4l_t request that the kernel load a kernel module
38905
Allow collectd to trace processes in user namespace
36293

2024-06-06

Add interfaces for watching and reading ifconfig_var_run_t
39408
Allow dhcpcd use unix_stream_socket
39408
Allow dhcpc read /run/netns files
39408
Allow all domains read and write z90crypt device
38833
Allow bootupd search efivarfs dirs
36289
Move unconfined_domain(sap_unconfined_t) to an optional block
37663