?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
##
## Final system configuration run during the first boot
## after installation of Red Hat/Fedora systems.
##
########################################
##
## Execute firstboot in the firstboot domain.
##
##
##
## The type of the process performing this action.
##
##
#
interface(`firstboot_domtrans',`
gen_require(`
type firstboot_t, firstboot_exec_t;
')
domtrans_pattern($1, firstboot_exec_t, firstboot_t)
')
########################################
##
## Execute firstboot in the firstboot domain, and
## allow the specified role the firstboot domain.
##
##
##
## The type of the process performing this action.
##
##
##
##
## The role to be allowed the firstboot domain.
##
##
#
interface(`firstboot_run',`
gen_require(`
type firstboot_t;
')
firstboot_domtrans($1)
role $2 types firstboot_t;
')
########################################
##
## Inherit and use a file descriptor from firstboot.
##
##
##
## The type of the process performing this action.
##
##
#
interface(`firstboot_use_fds',`
gen_require(`
type firstboot_t;
')
allow $1 firstboot_t:fd use;
')
########################################
##
## Do not audit attempts to inherit a
## file descriptor from firstboot.
##
##
##
## Domain to not audit.
##
##
#
interface(`firstboot_dontaudit_use_fds',`
gen_require(`
type firstboot_t;
')
dontaudit $1 firstboot_t:fd use;
')
########################################
##
## Write to a firstboot unnamed pipe.
##
##
##
## The type of the process performing this action.
##
##
#
interface(`firstboot_write_pipes',`
gen_require(`
type firstboot_t;
')
allow $1 firstboot_t:fifo_file write;
')
########################################
##
## Read and Write to a firstboot unnamed pipe.
##
##
##
## The type of the process performing this action.
##
##
#
interface(`firstboot_rw_pipes',`
gen_require(`
type firstboot_t;
')
allow $1 firstboot_t:fifo_file { read write };
')
########################################
##
## Do not audit attemps to read and write to a firstboot unnamed pipe.
##
##
##
## Domain to not audit.
##
##
#
interface(`firstboot_dontaudit_rw_pipes',`
gen_require(`
type firstboot_t;
')
dontaudit $1 firstboot_t:fifo_file { read write };
')
########################################
##
## Do not audit attemps to read and write to a firstboot
## unix domain stream socket.
##
##
##
## Domain to not audit.
##
##
#
interface(`firstboot_dontaudit_rw_stream_sockets',`
gen_require(`
type firstboot_t;
')
dontaudit $1 firstboot_t:unix_stream_socket { read write };
')
#######################################
##
## dontaudit read and write an leaked file descriptors
##
##
##
## Domain to not audit.
##
##
#
interface(`firstboot_dontaudit_leaks',`
gen_require(`
type firstboot_t;
')
dontaudit $1 firstboot_t:socket_class_set { read write };
dontaudit $1 firstboot_t:fifo_file rw_inherited_fifo_file_perms;
')