?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for administrative functions, such as package management. policy for accountsd Execute a domain transition to run accountsd. Domain allowed to transition. Search accountsd lib directories. Domain allowed access. Read accountsd lib files. Domain allowed access. Create, read, write, and delete accountsd lib files. Domain allowed access. Manage accountsd var_lib files. Domain allowed access. Send and receive messages from accountsd over dbus. Domain allowed access. Do not audit attempts to read and write Accounts Daemon fifo file. Domain allowed access. All of the rules required to administrate an accountsd environment Domain allowed access. Berkeley process accounting Transition to the accounting management domain. Domain allowed access. Execute accounting management tools in the caller domain. The type of the process performing this action. Execute accounting management data in the caller domain. The type of the process performing this action. Create, read, write, and delete process accounting data. The type of the process performing this action. Ainit ALSA configuration tool Domain transition to alsa Domain allowed access. Allow read and write access to alsa semaphores. Domain allowed access. Allow read and write access to alsa shared memory. Domain allowed access. Read alsa writable config files. Domain allowed access. Manage alsa writable config files. Domain allowed access. Read alsa lib files. Domain allowed access. Automated backup program. Execute amrecover in the amanda_recover domain. The type of the process performing this action. Execute amrecover in the amanda_recover domain, and allow the specified role the amanda_recover domain. The type of the process performing this action. The role to be allowed the amanda_recover domain. Search amanda library directories. The type of the process performing this action. Allow append amanda lib files. Domain to allow Do not audit attempts to read /etc/dumpdates. Domain to not audit. Allow read/writing /etc/dumpdates. Domain to allow Search amanda library directories. The type of the process performing this action. Allow read/writing amanda logs Domain to allow Search amanda var library directories. The type of the process performing this action. Abstract Machine Test Utility Execute amtu in the amtu domain. Domain allowed access. Execute amtu in the amtu domain, and allow the specified role the amtu domain. Domain allowed access. The role to be allowed the amtu domain. Policy for the Anaconda installer. Execute preupgrade in the caller domain. Domain allowed to transition. Execute a domain transition to run preupgrade. Domain allowed to transition. Read preupgrade lib files Domain allowed access. Manage preupgrade lib files Domain allowed access. APT advanced package tool. Execute apt programs in the apt domain. The type of the process performing this action. Execute apt programs in the apt domain. The type of the process performing this action. The role to allow the apt domain. Inherit and use file descriptors from apt. The type of the process performing this action. Do not audit attempts to use file descriptors from apt. The type of the process attempting performing this action which should not be audited. Read from an unnamed apt pipe. The type of the process performing this action. Read and write an unnamed apt pipe. The type of the process performing this action. Read from and write to apt ptys. Domain allowed access. Read the apt package cache. The type of the process performing this action. Read the apt package database. The type of the process performing this action. Create, read, write, and delete the apt package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the apt package database. Domain to not audit. System backup scripts Execute backup in the backup domain. Domain allowed access. Execute backup in the backup domain, and allow the specified role the backup domain. The type of the process performing this action. The role to be allowed the backup domain. Policy for the kernel modules, kernel image, and bootloader. Execute bootloader in the bootloader domain. The type of the process performing this action. Execute bootloader in the caller domain. The type of the process performing this action. Execute bootloader interactively and do a domain transition to the bootloader domain. The type of the process performing this action. The role to be allowed the bootloader domain. Read the bootloader configuration file. The type of the process performing this action. Read and write the bootloader configuration file. The type of the process performing this action. Manage the bootloader configuration file. Domain allowed access. Read and write the bootloader temporary data in /tmp. The type of the process performing this action. Read and write the bootloader temporary data in /tmp. The type of the process performing this action. Utilities for configuring the linux ethernet bridge Execute a domain transition to run brctl. Domain allowed to transition. Execute a domain transition to run brctl. Domain allowed to transition. Execute brctl in the brctl domain. Domain allowed to transition. Role allowed access. Digital Certificate Tracking Domain transition to certwatch. Domain allowed access. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. The type of the process performing this action. The role to be allowed the certwatch domain. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. (Deprecated) The type of the process performing this action. The role to be allowed the certwatch domain. The type of the terminal allow the certwatch domain to use. Determine of the console connected to the controlling terminal. Execute consoletype in the consoletype domain. The type of the process performing this action. Execute consoletype in the consoletype domain, and allow the specified role the consoletype domain. The type of the process performing this action. The role to be allowed the consoletype domain. Execute consoletype in the caller domain. The type of the process performing this action. ddcprobe retrieves monitor and graphics card information Execute ddcprobe in the ddcprobe domain. The type of the process performing this action. Execute ddcprobe in the ddcprobe domain, and allow the specified role the ddcprobe domain. The type of the process performing this action. Role to be authenticated for ddcprobe domain. Policy for dmesg. Execute dmesg in the dmesg domain. The type of the process performing this action. Execute dmesg in the caller domain. The type of the process performing this action. Decode DMI data for x86/ia64 bioses. Execute dmidecode in the dmidecode domain. Domain allowed access. Execute dmidecode in the dmidecode domain, and allow the specified role the dmidecode domain. The type of the process performing this action. The role to be allowed the dmidecode domain. Execute dmidecode in the caller domain. Domain allowed access. Policy for the Debian package manager. Execute dpkg programs in the dpkg domain. The type of the process performing this action. Execute dpkg_script programs in the dpkg_script domain. Domain allowed access. Execute dpkg programs in the dpkg domain. The type of the process performing this action. The role to allow the dpkg domain. Inherit and use file descriptors from dpkg. The type of the process performing this action. Read from an unnamed dpkg pipe. The type of the process performing this action. Read and write an unnamed dpkg pipe. The type of the process performing this action. Inherit and use file descriptors from dpkg scripts. The type of the process performing this action. Read the dpkg package database. The type of the process performing this action. Create, read, write, and delete the dpkg package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the dpkg package database. Domain to not audit. Lock the dpkg package database. The type of the process performing this action. Final system configuration run during the first boot after installation of Red Hat/Fedora systems. Execute firstboot in the firstboot domain. The type of the process performing this action. Execute firstboot in the firstboot domain, and allow the specified role the firstboot domain. The type of the process performing this action. The role to be allowed the firstboot domain. Inherit and use a file descriptor from firstboot. The type of the process performing this action. Do not audit attempts to inherit a file descriptor from firstboot. Domain to not audit. Write to a firstboot unnamed pipe. The type of the process performing this action. Read and Write to a firstboot unnamed pipe. The type of the process performing this action. Do not audit attemps to read and write to a firstboot unnamed pipe. Domain to not audit. Do not audit attemps to read and write to a firstboot unix domain stream socket. Domain to not audit. dontaudit read and write an leaked file descriptors Domain to not audit. Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Execute a domain transition to run kismet. Domain allowed to transition. Execute kismet in the kismet domain, and allow the specified role the kismet domain. Domain allowed access The role to be allowed the kismet domain. Read kismet PID files. Domain allowed access. Manage kismet var_run files. Domain allowed access. Search kismet lib directories. Domain allowed access. Read kismet lib files. Domain allowed access. Create, read, write, and delete kismet lib files. Domain allowed access. Manage kismet var_lib files. Domain allowed access. Allow the specified domain to read kismet's log files. Domain allowed access. Allow the specified domain to append kismet log files. Domain allowed to transition. Allow domain to manage kismet log files Domain to not audit. All of the rules required to administrate an kismet environment Domain allowed access. Hardware detection and configuration tools Execute kudzu in the kudzu domain. The type of the process performing this action. Execute kudzu in the kudzu domain, and allow the specified role the kudzu domain. The type of the process performing this action. The role to be allowed the kudzu domain. Get attributes of kudzu executable. The type of the process performing this action. Rotate and archive system logs Execute logrotate in the logrotate domain. The type of the process performing this action. Execute logrotate in the logrotate domain, and allow the specified role the logrotate domain. The type of the process performing this action. The role to be allowed the logrotate domain. Execute logrotate in the caller domain. The type of the process performing this action. Inherit and use logrotate file descriptors. Domain allowed access. Do not audit attempts to inherit logrotate file descriptors. The type of the process to not audit. Read a logrotate temporary files. The type of the process to not audit.

Allow logrotate to manage nfs files

System log analyzer and reporter Read logwatch temporary files. Domain allowed access. Search logwatch cache directory. Domain allowed access. policy for mcelog Execute a domain transition to run mcelog. Domain allowed to transition. Read mcelog logs. Domain allowed access.

Determine whether mcelog can use all the user ttys.

Network traffic graphing Create and append mrtg logs. Domain allowed access. policy for ncftool Execute a domain transition to run ncftool. Domain allowed to transition. Execute ncftool in the ncftool domain, and allow the specified role the ncftool domain. Domain allowed access The role to be allowed the ncftool domain. Role access for ncftool Role allowed access User domain for the role

Allow ncftool to read user content.

Network analysis utilities Execute network utilities in the netutils domain. Domain allowed access. Execute network utilities in the netutils domain, and allow the specified role the netutils domain. Domain allowed access. The role to be allowed the netutils domain. Execute network utilities in the caller domain. Domain allowed access. Send generic signals to network utilities. Domain allowed access. Execute ping in the ping domain. Domain allowed access. Send a kill (SIGKILL) signal to ping. Domain allowed access. Send generic signals to ping. Domain allowed access. Execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed access. The role to be allowed the ping domain. Conditionally execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed access. The role to be allowed the ping domain. Execute ping in the caller domain. Domain allowed access. Execute traceroute in the traceroute domain. Domain allowed access. Execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed access. The role to be allowed the traceroute domain. Conditionally execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed access. The role to be allowed the traceroute domain. Execute traceroute in the caller domain. Domain allowed access.

Control users use of ping and traceroute

No Interfaces Portage Package Management System. The primary package management and distribution system for Gentoo. Execute emerge in the portage domain. Domain allowed access. Execute emerge in the portage domain, and allow the specified role the portage domain. Domain allowed access. The role to allow the portage domain. Template for portage sandbox.

Template for portage sandbox. Portage does all compiling in the sandbox.

Domain Allowed Access
Execute gcc-config in the gcc_config domain. Domain allowed access. Execute gcc-config in the gcc_config domain, and allow the specified role the gcc_config domain. Domain allowed access. The role to allow the gcc_config domain. Do not audit attempts to search the portage temporary directories. Domain allowed access. Do not audit attempts to read and write the portage temporary files. Domain allowed access.
Prelink ELF shared library mappings. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the current domain. Domain allowed access. Getattr the prelink program in the current domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. The role to allow the prelink domain. Make the specified file type prelinkable. File type to be prelinked. Read the prelink cache. Domain allowed access. Delete the prelink cache. Domain allowed access. Create, read, write, and delete prelink log files. Domain allowed access. Create, read, write, and delete prelink var_lib files. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. File system quota management Execute quota management tools in the quota domain. The type of the process performing this action. Execute quota management tools in the quota domain, and allow the specified role the quota domain. The type of the process performing this action. The role to be allowed the quota domain. Do not audit attempts to get the attributes of filesystem quota data files. Domain to not audit. Alow to read of filesystem quota data files. Domain to not audit. Create, read, write, and delete quota flag files. Domain to not audit. Readahead, read files into page cache for improved performance Policy for the RPM package manager. Execute rpm programs in the rpm domain. The type of the process performing this action. Execute debuginfo_install programs in the rpm domain. The type of the process performing this action. Execute rpm_script programs in the rpm_script domain. Domain allowed access. Execute RPM programs in the RPM domain. The type of the process performing this action. The role to allow the RPM domain. Execute the rpm client in the caller domain. Domain allowed access. Inherit and use file descriptors from RPM. The type of the process performing this action. Read from an unnamed RPM pipe. The type of the process performing this action. Read and write an unnamed RPM pipe. The type of the process performing this action. dontaudit read and write an leaked file descriptors The type of the process performing this action. Do not audit attempts to create, read, write, and delete RPM script temporary files. Domain to not audit. Send and receive messages from rpm over dbus. Domain allowed access. dontaudit attempts to Send and receive messages from rpm over dbus. Domain allowed access. Send and receive messages from rpm_script over dbus. Domain allowed access. Allow the specified domain to append to rpm log files. Domain allowed access. Create, read, write, and delete the RPM log. The type of the process performing this action. Search RPM log directory. The type of the process performing this action. Inherit and use file descriptors from RPM scripts. The type of the process performing this action. Create, read, write, and delete RPM script temporary files. Domain allowed access. Allow the specified domain to append to rpm tmp files. Domain allowed access. Create, read, write, and delete RPM temporary files. Domain allowed access. read, RPM script temporary files. Domain allowed access. Read the RPM package database. The type of the process performing this action. Delete the RPM package database. The type of the process performing this action. Create, read, write, and delete the RPM package database. The type of the process performing this action. Do not audit attempts to create, read,the RPM package database. Domain to not audit. Read the RPM cache. The type of the process performing this action. Create, read, write, and delete the RPM package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the RPM package database. Domain to not audit. Dontaudit search the RPM package database. Domain allowed access. Read rpm pid files. Domain allowed access. Create, read, write, and delete rpm pid files. Domain allowed access. Create files in /var/run with the rpm pid file type. Domain allowed access. Allow application to transition to rpm_script domain. Domain allowed access. Send a null signal to rpm. Domain allowed access. Send a null signal to rpm. Domain allowed access. Sectool security audit tool Shoreline Firewall high-level tool for configuring netfilter Execute a domain transition to run shorewall. Domain allowed to transition. Execute a domain transition to run shorewall. Domain allowed to transition. Read shorewall etc configuration files. Domain allowed access. Read shorewall /var/lib files. Domain allowed access. Read and write shorewall /var/lib files. Domain allowed access. Read shorewall tmp files. Domain allowed access. All of the rules required to administrate an shorewall environment Domain allowed access. The role to be allowed to manage the syslog domain. policy for shutdown Execute a domain transition to run shutdown. Domain allowed to transition. Execute shutdown in the shutdown domain, and allow the specified role the shutdown domain. Domain allowed access The role to be allowed the shutdown domain. Role access for shutdown Role allowed access User domain for the role Recieve sigchld from shutdown Domain allowed access Send and receive messages from shutdown over dbus. Domain allowed access. Get attributes of shutdown executable. Domain allowed access. The Fedora hardware profiler client Run shells with substitute user and group Execute su in the caller domain. Domain allowed access. Execute a command with a substitute user Send a SIGCHLD signal to the sudo domain. Domain allowed access. Allow execute sudo in called domain. This interfaces is added for nova-stack policy. Domain allowed access. Allow to manage sudo database in called domain. Domain allowed access. SUID/SGID program monitoring Allow the specified domain to read sxid log files. Domain allowed access. Manage temporary directory sizes and file ages Execute tmpreaper in the caller domain. The type of the process performing this action.

Determine whether tmpreaper can use nfs file systems.

Determine whether tmpreaper can use samba_share files

Tripwire file integrity checker.

Tripwire file integrity checker.

NOTE: Tripwire creates temp file in its current working directory. This policy does not allow write access to home directories, so users will need to either cd to a directory where they have write permission, or set the TEMPDIRECTORY variable in the tripwire config file. The latter is preferable, as then the file_type_auto_trans rules will kick in and label the files as private to tripwire.

Execute tripwire in the tripwire domain. Domain allowed access. Execute tripwire in the tripwire domain, and allow the specified role the tripwire domain. Domain allowed access. The role to be allowed the tripwire domain. Execute twadmin in the twadmin domain. Domain allowed access. Execute twadmin in the twadmin domain, and allow the specified role the twadmin domain. Domain allowed access. The role to be allowed the twadmin domain. Execute twprint in the twprint domain. Domain allowed access. Execute twprint in the twprint domain, and allow the specified role the twprint domain. Domain allowed access. The role to be allowed the twprint domain. Execute siggen in the siggen domain. Domain allowed access. Execute siggen in the siggen domain, and allow the specified role the siggen domain. Domain allowed access. The role to be allowed the siggen domain.
Time zone updater Execute a domain transition to run tzdata. Domain allowed to transition. Execute the tzdata program in the tzdata domain. Domain allowed access. The role to allow the tzdata domain. Red Hat utility to change /etc/fstab. Execute updfstab in the updfstab domain. The type of the process performing this action. List kernel modules of USB devices Execute usbmodules in the usbmodules domain. Domain allowed access. Execute usbmodules in the usbmodules domain, and allow the specified role the usbmodules domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the usbmodules domain. Policy for managing user accounts. Execute chfn in the chfn domain. The type of the process performing this action. Execute chfn in the chfn domain, and allow the specified role the chfn domain. The type of the process performing this action. The role to be allowed the chfn domain. Execute groupadd in the groupadd domain. The type of the process performing this action. Check access to the groupadd executable. Domain allowed access. Execute groupadd in the groupadd domain, and allow the specified role the groupadd domain. The type of the process performing this action. The role to be allowed the groupadd domain. Execute passwd in the passwd domain. The type of the process performing this action. Send sigkills to passwd. Domain allowed access. Execute passwd in the passwd domain, and allow the specified role the passwd domain. The type of the process performing this action. The role to be allowed the passwd domain. Check access to the passwd executable Domain allowed access. Execute password admin functions in the admin passwd domain. Domain allowed access. Execute passwd admin functions in the admin passwd domain, and allow the specified role the admin passwd domain. The type of the process performing this action. The role to be allowed the admin passwd domain. Dontaudit attempts to use useradd fds The type of the process performing this action. Execute useradd in the useradd domain. The type of the process performing this action. Execute useradd in the useradd domain, and allow the specified role the useradd domain. The type of the process performing this action. The role to be allowed the useradd domain. Check access to the useradd executable. Domain allowed access. Read the crack database. The type of the process performing this action. run real-mode video BIOS code to alter hardware state Execute vbetool application in the vbetool domain. Domain allowed access. Execute vbetool in the vbetool domain, and allow the specified role the vbetool domain. Domain allowed access. The role to be allowed the vbetool domain.

Ignore vbetool mmap_zero errors.

Virtual Private Networking client Execute VPN clients in the vpnc domain. Domain allowed access. Execute VPN clients in the vpnc domain, and allow the specified role the vpnc domain. Domain allowed access. The role to be allowed the vpnc domain. Send VPN clients the kill signal. Domain allowed access. Send generic signals to VPN clients. Domain allowed access. Send signull to VPN clients. Domain allowed access. Send and receive messages from Vpnc over dbus. Domain allowed access. Relabelfrom from vpnc socket. Domain allowed access.