?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
## execmem domain
########################################
##
## Execute the execmem program in the execmem domain.
##
##
##
## Domain allowed access.
##
##
#
interface(`execmem_exec',`
gen_require(`
type execmem_exec_t;
')
can_exec($1, execmem_exec_t)
')
#######################################
##
## The role template for the execmem module.
##
##
##
## This template creates a derived domains which are used
## for execmem applications.
##
##
##
##
## The prefix of the user domain (e.g., user
## is the prefix for user_t).
##
##
##
##
## The role associated with the user domain.
##
##
##
##
## The type of the user domain.
##
##
#
template(`execmem_role_template',`
gen_require(`
type execmem_exec_t;
')
type $1_execmem_t;
domain_type($1_execmem_t)
domain_entry_file($1_execmem_t, execmem_exec_t)
role $2 types $1_execmem_t;
userdom_unpriv_usertype($1, $1_execmem_t)
userdom_manage_tmp_role($2, $1_execmem_t)
userdom_manage_tmpfs_role($2, $1_execmem_t)
allow $1_execmem_t self:process { execmem execstack };
allow $3 $1_execmem_t:process { getattr ptrace noatsecure signal_perms };
domtrans_pattern($3, execmem_exec_t, $1_execmem_t)
ifdef(`hide_broken_symptoms', `
dontaudit $1_execmem_t $3:socket_class_set { read write };
')
files_execmod_tmp($1_execmem_t)
allow $3 execmem_exec_t:file execmod;
allow $1_execmem_t execmem_exec_t:file execmod;
optional_policy(`
chrome_role($2, $1_execmem_t)
')
optional_policy(`
mozilla_execmod_user_home_files($1_execmem_t)
')
optional_policy(`
nsplugin_rw_shm($1_execmem_t)
nsplugin_rw_semaphores($1_execmem_t)
')
optional_policy(`
xserver_role($2, $1_execmem_t)
')
')
########################################
##
## Execute a execmem_exec file
## in the specified domain.
##
##
##
## Domain allowed access.
##
##
##
##
## The type of the new process.
##
##
#
interface(`execmem_domtrans',`
gen_require(`
type execmem_exec_t;
')
domtrans_pattern($1, execmem_exec_t, $2)
')
#######################################
##
## Execmod the execmem_exec applications
##
##
##
## Domain allowed access.
##
##
#
interface(`execmem_execmod',`
gen_require(`
type execmem_exec_t;
')
allow $1 execmem_exec_t:file execmod;
')