?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
## ## Final system configuration run during the first boot ## after installation of Red Hat/Fedora systems. ## ######################################## ## ## Execute firstboot in the firstboot domain. ## ## ## ## The type of the process performing this action. ## ## # interface(`firstboot_domtrans',` gen_require(` type firstboot_t, firstboot_exec_t; ') domtrans_pattern($1, firstboot_exec_t, firstboot_t) ') ######################################## ## ## Execute firstboot in the firstboot domain, and ## allow the specified role the firstboot domain. ## ## ## ## The type of the process performing this action. ## ## ## ## ## The role to be allowed the firstboot domain. ## ## # interface(`firstboot_run',` gen_require(` type firstboot_t; ') firstboot_domtrans($1) role $2 types firstboot_t; ') ######################################## ## ## Inherit and use a file descriptor from firstboot. ## ## ## ## The type of the process performing this action. ## ## # interface(`firstboot_use_fds',` gen_require(` type firstboot_t; ') allow $1 firstboot_t:fd use; ') ######################################## ## ## Do not audit attempts to inherit a ## file descriptor from firstboot. ## ## ## ## Domain to not audit. ## ## # interface(`firstboot_dontaudit_use_fds',` gen_require(` type firstboot_t; ') dontaudit $1 firstboot_t:fd use; ') ######################################## ## ## Write to a firstboot unnamed pipe. ## ## ## ## The type of the process performing this action. ## ## # interface(`firstboot_write_pipes',` gen_require(` type firstboot_t; ') allow $1 firstboot_t:fifo_file write; ') ######################################## ## ## Read and Write to a firstboot unnamed pipe. ## ## ## ## The type of the process performing this action. ## ## # interface(`firstboot_rw_pipes',` gen_require(` type firstboot_t; ') allow $1 firstboot_t:fifo_file { read write }; ') ######################################## ## ## Do not audit attemps to read and write to a firstboot unnamed pipe. ## ## ## ## Domain to not audit. ## ## # interface(`firstboot_dontaudit_rw_pipes',` gen_require(` type firstboot_t; ') dontaudit $1 firstboot_t:fifo_file { read write }; ') ######################################## ## ## Do not audit attemps to read and write to a firstboot ## unix domain stream socket. ## ## ## ## Domain to not audit. ## ## # interface(`firstboot_dontaudit_rw_stream_sockets',` gen_require(` type firstboot_t; ') dontaudit $1 firstboot_t:unix_stream_socket { read write }; ') ####################################### ## ## dontaudit read and write an leaked file descriptors ## ## ## ## Domain to not audit. ## ## # interface(`firstboot_dontaudit_leaks',` gen_require(` type firstboot_t; ') dontaudit $1 firstboot_t:socket_class_set { read write }; dontaudit $1 firstboot_t:fifo_file rw_inherited_fifo_file_perms; ')