معرفی شرکت ها


selinux-policy-devel-38.1.56-1.el9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy development files
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 9-stream
مخزن Centos AppStream noarch
نام بسته selinux-policy-devel
نام فایل بسته selinux-policy-devel-38.1.56-1.el9.noarch.rpm
نسخه بسته 38.1.56
انتشار بسته 1.el9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Tue 06 May 2025 03
هاست سازنده ppc64le-07.stream.rdu2.redhat.com
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 1.5M
حجم نصب 22.529M
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-devel-38.1.22-1.el9.noarch.rpm 38.1.22 noarch CentOS AppStream
selinux-policy-devel-38.1.23-1.el9.noarch.rpm 38.1.23 noarch CentOS AppStream
selinux-policy-devel-38.1.24-1.el9.noarch.rpm 38.1.24 noarch CentOS AppStream
selinux-policy-devel-38.1.25-1.el9.noarch.rpm 38.1.25 noarch CentOS AppStream
selinux-policy-devel-38.1.26-1.el9.noarch.rpm 38.1.26 noarch CentOS AppStream
selinux-policy-devel-38.1.27-1.el9.noarch.rpm 38.1.27 noarch CentOS AppStream
selinux-policy-devel-38.1.29-1.el9.noarch.rpm 38.1.29 noarch CentOS AppStream
selinux-policy-devel-38.1.30-1.el9.noarch.rpm 38.1.30 noarch CentOS AppStream
selinux-policy-devel-38.1.31-1.el9.noarch.rpm 38.1.31 noarch CentOS AppStream
selinux-policy-devel-38.1.33-1.el9.noarch.rpm 38.1.33 noarch CentOS AppStream
selinux-policy-devel-38.1.48-1.el9.noarch.rpm 38.1.48 noarch CentOS AppStream
selinux-policy-devel-38.1.49-1.el9.noarch.rpm 38.1.49 noarch CentOS AppStream
selinux-policy-devel-38.1.50-1.el9.noarch.rpm 38.1.50 noarch CentOS AppStream
selinux-policy-devel-38.1.51-1.el9.noarch.rpm 38.1.51 noarch CentOS AppStream
selinux-policy-devel-38.1.53-1.el9.noarch.rpm 38.1.53 noarch CentOS AppStream
selinux-policy-devel-38.1.58-1.el9.noarch.rpm 38.1.58 noarch CentOS AppStream
selinux-policy-devel-38.1.60-1.el9.noarch.rpm 38.1.60 noarch CentOS AppStream
selinux-policy-devel-38.1.62-1.el9.noarch.rpm 38.1.62 noarch CentOS AppStream
selinux-policy-devel-38.1.63-1.el9.noarch.rpm 38.1.63 noarch CentOS AppStream
selinux-policy-devel-40.13.17-1.el10.noarch.rpm 40.13.17 noarch CentOS AppStream
selinux-policy-devel-40.13.19-1.el10.noarch.rpm 40.13.19 noarch CentOS AppStream
selinux-policy-devel-40.13.21-1.el10.noarch.rpm 40.13.21 noarch CentOS AppStream
selinux-policy-devel-40.13.22-1.el10.noarch.rpm 40.13.22 noarch CentOS AppStream
selinux-policy-devel-40.13.24-1.el10.noarch.rpm 40.13.24 noarch CentOS AppStream


نیازمندی

مقدار نام
- /bin/sh
- /usr/bin/bash
- /usr/bin/make
>= 3.2 checkpolicy
- m4
>= 3.4-1 policycoreutils-devel
= 38.1.56-1.el9 selinux-policy
= 38.1.56-1.el9 selinux-policy


ارائه دهنده

مقدار نام
= 38.1.56-1.el9 selinux-policy-devel


نحوه نصب


نصب پکیج rpm selinux-policy-devel:

    None


فایل ها

مسیرها
/usr/bin/macro-expander
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/NetworkManager.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_chronyc.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_cloud.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_console.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_custom.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_ddclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dhclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dnssec.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_iscsid.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_sendmail.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_tlp.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_winbind.html
/usr/share/selinux/devel/html/NetworkManager_priv_helper.html
/usr/share/selinux/devel/html/NetworkManager_ssh.html
/usr/share/selinux/devel/html/abrt.html
/usr/share/selinux/devel/html/abrt_dump_oops.html
/usr/share/selinux/devel/html/abrt_handle_event.html
/usr/share/selinux/devel/html/abrt_helper.html
/usr/share/selinux/devel/html/abrt_retrace_coredump.html
/usr/share/selinux/devel/html/abrt_retrace_worker.html
/usr/share/selinux/devel/html/abrt_upload_watch.html
/usr/share/selinux/devel/html/abrt_watch_log.html
/usr/share/selinux/devel/html/accountsd.html
/usr/share/selinux/devel/html/acct.html
/usr/share/selinux/devel/html/admin_crontab.html
/usr/share/selinux/devel/html/afs.html
/usr/share/selinux/devel/html/afs_bosserver.html
/usr/share/selinux/devel/html/afs_fsserver.html
/usr/share/selinux/devel/html/afs_kaserver.html
/usr/share/selinux/devel/html/afs_ptserver.html
/usr/share/selinux/devel/html/afs_vlserver.html
/usr/share/selinux/devel/html/afterburn.html
/usr/share/selinux/devel/html/aiccu.html
/usr/share/selinux/devel/html/aide.html
/usr/share/selinux/devel/html/ajaxterm.html
/usr/share/selinux/devel/html/ajaxterm_ssh.html
/usr/share/selinux/devel/html/alsa.html
/usr/share/selinux/devel/html/amanda.html
/usr/share/selinux/devel/html/amanda_recover.html
/usr/share/selinux/devel/html/amtu.html
/usr/share/selinux/devel/html/anaconda.html
/usr/share/selinux/devel/html/anon_sftpd.html
... and 1382 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2025-05-06

Remove 3 permissive domains
82674
Allow tuned-ppd dbus chat with xdm
87203
Allow system-dbusd list systemd-machined directories
85379
Allow NetworkManager create and use icmp_socket
83529
Allow journalctl connect to systemd-userdbd over a unix socket
82673
allow gdm and iiosensorproxy talk to each other via D-bus
80697
Allow varnishd execute the prlimit64() syscall
77995
Allow system_dbusd_t r/w unix stream sockets of unconfined_service_t
61928
Add the getattr permission to 2 dontaudit interfaces
59145

2025-04-11

automotive: Deny unknown classes/permissions (RHEL-86827)

2025-04-11

Allow tuned-ppd read sssd public files
69526
Allow systemd-journal-upload read init pid files
62196
Label SetroubleshootPrivileged.py with setroubleshootd_exec_t
77319
Allow chronyd-restricted sendto to chronyc
82308
Allow chronyc sendto to chronyd-restricted
82308

2025-03-31

Confine tuned-ppd
69526
Make tuned work with mls policy
69526
Allow afterburn to mount and read config drives
79319

2025-03-14

Allow afterburn to mount and read config drives
82276

2025-02-07

Allow svirt_t to connect to nbdkit over a unix stream socket
56029
Allow power-profiles-daemon the bpf capability
61117
Allow systemd-machined the kill user-namespace capability
76352

2025-01-31

Add the files_read_root_files() interface
70849
Dontaudit systemd-logind remove all files
59145
Add the files_dontaudit_read_all_dirs() interface
59145
Add the files_dontaudit_delete_all_files() interface
59145
Allow rhsmcertd notify virt-who
77152
Allow irqbalance to run unconfined scripts conditionally
1556
Backport bootupd policy from current Fedora rawhide
70849
Support using systemd containers
76352
Allow svirt_t connect to unconfined_t over a unix domain socket
37539
Allow virt_domain to use pulseaudio - conditional
1379
Allow telnetd read network sysctls
58825
Allow alsa watch generic device directories
61472
Update switcheroo policy
24268

2025-01-15

Allow rsyslog read systemd-logind session files
73839
Allow samba-bgqd connect to cupsd over an unix domain stream socket
72860
Allow svirt_t read sysfs files
70839
Allow xdm dbus chat with power-profiles-daemon
61117
Update power-profiles-daemon policy
61117
Confine power-profiles-daemon
61117
Allow virtqemud domain transition to nbdkit
56029
Add nbdkit interfaces defined conditionally
56029
Confine the switcheroo-control service
24268

2024-12-13

Allow auditctl signal auditd
68969
Fix the cups_read_pid_files() interface to use read_files_pattern
69517
Dontaudit systemd-coredump the sys_resource capability
46339
Allow rpcd read network sysctls
1558
Allow irqbalance setpcap capability in the user namespace
69564
Allow traceroute_t bind rawip sockets to unreserved ports
54561
Allow svirt_t the sys_rawio capability
56955
56988
Exclude container-selinux manpage from selinux-policy-doc
69916

2024-12-06

Update virtlogd policy
69433
Allow svirt_t the sys_rawio capability
56955
Allow qemu-ga the dac_override and dac_read_search capabilities
52476
Allow ip the setexec permission
62923
Allow alsa get attributes filesystems with extended attributes
61472
Allow bacula execute container in the container domain
21168
Allow httpd get attributes of dirsrv unit files
46808
Update samba-bgqd policy
69517
Allow samba-bgqd read cups config files
69517
Update policy for samba-bgqd
69517
Update bootupd policy for the removing-state-file test
66584
Allow qatlib search the content of the kernel debugging filesystem
53864
Allow qatlib connect to systemd-machined over a unix socket
53864
Update qatlib policy for v24.02 with new features
53864

2024-11-12

Revert "Allow unconfined_t execute kmod in the kmod domain"
65008
Add policy for /usr/libexec/samba/samba-bgqd
53124

2024-10-23

Label /etc/sysctl.d and /run/sysctl.d with system_conf_t
56988
Allow lldpad create and use netlink_generic_socket
61832
Allow unconfined_t execute kmod in the kmod domain
54710
Allow confined users r/w to screen unix stream socket
50379
Label /root/.screenrc and /root/.tmux.conf with screen_home_t
50375
Allow iio-sensor-proxy the bpf capability
17346

2024-10-11

Rebuild

2024-10-10

Label /run/modprobe.d with modules_conf_t
61453
Allow boothd connect to kernel over a unix socket
57104
Allow boothd connect to systemd-userdbd over a unix socket
57104
Additional updates stalld policy for bpf usage
57075
Update stalld policy for bpf usage
57075
Allow ptp4l the sys_admin capability
55133
Label /dev/hfi1_[0-9]+ devices
54996
Confine iio-sensor-proxy
17346

2024-09-16

Rebuild
55414

2024-09-04

Rebuild
55414