معرفی شرکت ها


selinux-policy-devel-38.1.63-1.el9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

SELinux policy development files
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 9-stream
مخزن Centos AppStream noarch
نام بسته selinux-policy-devel
نام فایل بسته selinux-policy-devel-38.1.63-1.el9.noarch.rpm
نسخه بسته 38.1.63
انتشار بسته 1.el9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Wed 30 Jul 2025 08
هاست سازنده aarch64-06.stream.rdu2.redhat.com
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/fedora-selinux/selinux-policy
مجوز GPLv2+
حجم دانلود 1.5M
حجم نصب 22.559M
SELinux policy development package. This package contains: - interfaces, macros, and patterns for policy development - a policy example - the macro-expander utility and some additional files.


جایگزین ها

بسته نسخه معماری مخزن
selinux-policy-devel-38.1.22-1.el9.noarch.rpm 38.1.22 noarch CentOS AppStream
selinux-policy-devel-38.1.23-1.el9.noarch.rpm 38.1.23 noarch CentOS AppStream
selinux-policy-devel-38.1.24-1.el9.noarch.rpm 38.1.24 noarch CentOS AppStream
selinux-policy-devel-38.1.25-1.el9.noarch.rpm 38.1.25 noarch CentOS AppStream
selinux-policy-devel-38.1.26-1.el9.noarch.rpm 38.1.26 noarch CentOS AppStream
selinux-policy-devel-38.1.27-1.el9.noarch.rpm 38.1.27 noarch CentOS AppStream
selinux-policy-devel-38.1.29-1.el9.noarch.rpm 38.1.29 noarch CentOS AppStream
selinux-policy-devel-38.1.30-1.el9.noarch.rpm 38.1.30 noarch CentOS AppStream
selinux-policy-devel-38.1.31-1.el9.noarch.rpm 38.1.31 noarch CentOS AppStream
selinux-policy-devel-38.1.33-1.el9.noarch.rpm 38.1.33 noarch CentOS AppStream
selinux-policy-devel-38.1.48-1.el9.noarch.rpm 38.1.48 noarch CentOS AppStream
selinux-policy-devel-38.1.49-1.el9.noarch.rpm 38.1.49 noarch CentOS AppStream
selinux-policy-devel-38.1.50-1.el9.noarch.rpm 38.1.50 noarch CentOS AppStream
selinux-policy-devel-38.1.51-1.el9.noarch.rpm 38.1.51 noarch CentOS AppStream
selinux-policy-devel-38.1.53-1.el9.noarch.rpm 38.1.53 noarch CentOS AppStream
selinux-policy-devel-38.1.56-1.el9.noarch.rpm 38.1.56 noarch CentOS AppStream
selinux-policy-devel-38.1.58-1.el9.noarch.rpm 38.1.58 noarch CentOS AppStream
selinux-policy-devel-38.1.60-1.el9.noarch.rpm 38.1.60 noarch CentOS AppStream
selinux-policy-devel-38.1.62-1.el9.noarch.rpm 38.1.62 noarch CentOS AppStream
selinux-policy-devel-40.13.17-1.el10.noarch.rpm 40.13.17 noarch CentOS AppStream
selinux-policy-devel-40.13.19-1.el10.noarch.rpm 40.13.19 noarch CentOS AppStream
selinux-policy-devel-40.13.21-1.el10.noarch.rpm 40.13.21 noarch CentOS AppStream
selinux-policy-devel-40.13.22-1.el10.noarch.rpm 40.13.22 noarch CentOS AppStream
selinux-policy-devel-40.13.24-1.el10.noarch.rpm 40.13.24 noarch CentOS AppStream


نیازمندی

مقدار نام
- /bin/sh
- /usr/bin/bash
- /usr/bin/make
>= 3.2 checkpolicy
- m4
>= 3.4-1 policycoreutils-devel
= 38.1.63-1.el9 selinux-policy
= 38.1.63-1.el9 selinux-policy


ارائه دهنده

مقدار نام
= 38.1.63-1.el9 selinux-policy-devel


نحوه نصب


نصب پکیج rpm selinux-policy-devel:

    None


فایل ها

مسیرها
/usr/bin/macro-expander
/usr/share/selinux/devel
/usr/share/selinux/devel/Makefile
/usr/share/selinux/devel/example.fc
/usr/share/selinux/devel/example.if
/usr/share/selinux/devel/example.te
/usr/share/selinux/devel/html
/usr/share/selinux/devel/html/NetworkManager.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_chronyc.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_cloud.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_console.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_custom.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_ddclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dhclient.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_dnssec.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_iscsid.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_sendmail.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_tlp.html
/usr/share/selinux/devel/html/NetworkManager_dispatcher_winbind.html
/usr/share/selinux/devel/html/NetworkManager_priv_helper.html
/usr/share/selinux/devel/html/NetworkManager_ssh.html
/usr/share/selinux/devel/html/abrt.html
/usr/share/selinux/devel/html/abrt_dump_oops.html
/usr/share/selinux/devel/html/abrt_handle_event.html
/usr/share/selinux/devel/html/abrt_helper.html
/usr/share/selinux/devel/html/abrt_retrace_coredump.html
/usr/share/selinux/devel/html/abrt_retrace_worker.html
/usr/share/selinux/devel/html/abrt_upload_watch.html
/usr/share/selinux/devel/html/abrt_watch_log.html
/usr/share/selinux/devel/html/accountsd.html
/usr/share/selinux/devel/html/acct.html
/usr/share/selinux/devel/html/admin_crontab.html
/usr/share/selinux/devel/html/afs.html
/usr/share/selinux/devel/html/afs_bosserver.html
/usr/share/selinux/devel/html/afs_fsserver.html
/usr/share/selinux/devel/html/afs_kaserver.html
/usr/share/selinux/devel/html/afs_ptserver.html
/usr/share/selinux/devel/html/afs_vlserver.html
/usr/share/selinux/devel/html/afterburn.html
/usr/share/selinux/devel/html/aiccu.html
/usr/share/selinux/devel/html/aide.html
/usr/share/selinux/devel/html/ajaxterm.html
/usr/share/selinux/devel/html/ajaxterm_ssh.html
/usr/share/selinux/devel/html/alsa.html
/usr/share/selinux/devel/html/amanda.html
/usr/share/selinux/devel/html/amanda_recover.html
/usr/share/selinux/devel/html/amtu.html
/usr/share/selinux/devel/html/anaconda.html
/usr/share/selinux/devel/html/anon_sftpd.html
... and 1385 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2025-07-30

Allow samba-dcerpcd send sigkills to passwd
100032
Allow power-profiles-daemon watch sysfs directories
100718
Allow power-profiles-daemon write sysfs files
100718
Allow hostapd write to socket files in /tmp
59683
Allow irqbalance search sssd lib directories
1556
Add insights_client_delete_lib_dirs() interface
59145

2025-07-18

Allow "hostapd_cli ping" run as a systemd service
59683
Allow systemd-timedated start/stop timemaster services
95690
Allow lldpd connect to systemd-machined over a unix socket
96167
Allow power-profiles-daemon get attributes of filesystems with extended attributes
100718
Allow tuned-ppd watch_reads sysfs directories
101687
Allow tuned-ppd watch sysfs directories
101687

2025-07-14

Fix incorrect /run and /usr/bin file context entries
4392
Dontaudit irqbalance read sssd public files
1556
Update sssd_dontaudit_read_public_files()
1556
Allow insights-client file transition for files in /var/tmp
4392
Add the virt_exec_virsh() interface
4392
Add the ssh_exec_sshd() interface
4392
Add rhsmcertd interfaces
4392
Add the bind_exec_named_checkconf() interface
4392
Add the auth_write_motd_var_run_files() interface
4392
Add the gpg_domtrans_agent() interface
4392
Add the gpg_read_user_secrets() interface
4392
Add policy for insights-core
4392

2025-07-03

Allow irqbalance execute shell if irqbalance_run_unconfined is on
1556
Update irqbalance policy for using unconfined scripts
1556

2025-07-01

virt: allow QEMU use of the qgs daemon for attestation
87744
qgs: add contrib module for TDX "qgs" daemon
87744
kernel: add interfaces for using SGX enclaves
87744
Allow coreos-installer search sssd library directory
95689
Label /dev/diag as diagnostic_device_t
95342
Allow irqbalance execute shell if irqbalance_run_unconfined is on
1556

2025-06-09

Allow mptcpd the net_admin capability
81729
Allow networkmanager send a general signal to iptables
93741
Make bootupd use bootupd_tmp_t as its private type for files in /tmp
94508
Update bootupd policy
94508
Allow switcheroo-control dbus chat with xdm
93335
Update the files_search_mnt() interface
94184

2025-05-29

Update policy for haproxyd
88045
Allow NetworkManager manage NetworkManager_etc_rw_t symlinks
86178
Allow lldpad connect to systemd-userdbd over a unix socket
84046
Allow gconfd connect to system dbus
77984
Allow login_pgm read filesystem sysctls
77745
Allow login_userdomain create /run/tlog directory with user_tmp_t
47241

2025-05-06

Remove 3 permissive domains
82674
Allow tuned-ppd dbus chat with xdm
87203
Allow system-dbusd list systemd-machined directories
85379
Allow NetworkManager create and use icmp_socket
83529
Allow journalctl connect to systemd-userdbd over a unix socket
82673
allow gdm and iiosensorproxy talk to each other via D-bus
80697
Allow varnishd execute the prlimit64() syscall
77995
Allow system_dbusd_t r/w unix stream sockets of unconfined_service_t
61928
Add the getattr permission to 2 dontaudit interfaces
59145

2025-04-11

automotive: Deny unknown classes/permissions (RHEL-86827)

2025-04-11

Allow tuned-ppd read sssd public files
69526
Allow systemd-journal-upload read init pid files
62196
Label SetroubleshootPrivileged.py with setroubleshootd_exec_t
77319
Allow chronyd-restricted sendto to chronyc
82308
Allow chronyc sendto to chronyd-restricted
82308

2025-03-31

Confine tuned-ppd
69526
Make tuned work with mls policy
69526
Allow afterburn to mount and read config drives
79319

2025-03-14

Allow afterburn to mount and read config drives
82276

2025-02-07

Allow svirt_t to connect to nbdkit over a unix stream socket
56029
Allow power-profiles-daemon the bpf capability
61117
Allow systemd-machined the kill user-namespace capability
76352

2025-01-31

Add the files_read_root_files() interface
70849
Dontaudit systemd-logind remove all files
59145
Add the files_dontaudit_read_all_dirs() interface
59145
Add the files_dontaudit_delete_all_files() interface
59145
Allow rhsmcertd notify virt-who
77152
Allow irqbalance to run unconfined scripts conditionally
1556
Backport bootupd policy from current Fedora rawhide
70849
Support using systemd containers
76352
Allow svirt_t connect to unconfined_t over a unix domain socket
37539
Allow virt_domain to use pulseaudio - conditional
1379
Allow telnetd read network sysctls
58825
Allow alsa watch generic device directories
61472
Update switcheroo policy
24268

2025-01-15

Allow rsyslog read systemd-logind session files
73839
Allow samba-bgqd connect to cupsd over an unix domain stream socket
72860
Allow svirt_t read sysfs files
70839
Allow xdm dbus chat with power-profiles-daemon
61117
Update power-profiles-daemon policy
61117
Confine power-profiles-daemon
61117
Allow virtqemud domain transition to nbdkit
56029
Add nbdkit interfaces defined conditionally
56029
Confine the switcheroo-control service
24268

2024-12-13

Allow auditctl signal auditd
68969
Fix the cups_read_pid_files() interface to use read_files_pattern
69517
Dontaudit systemd-coredump the sys_resource capability
46339
Allow rpcd read network sysctls
1558
Allow irqbalance setpcap capability in the user namespace
69564
Allow traceroute_t bind rawip sockets to unreserved ports
54561
Allow svirt_t the sys_rawio capability
56955
56988
Exclude container-selinux manpage from selinux-policy-doc
69916