?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for user roles. Audit administrator role Change to the audit administrator role. Role allowed access. Change from the audit administrator role.

Change from the audit administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Database administrator role Change to the database administrator role. Role allowed access. Change from the database administrator role.

Change from the web administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Least privledge terminal user Change to the guest role. Role allowed access. Change from the guest role.

Change from the guest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Log administrator role Change to the log administrator role. Role allowed access. Change from the log administrator role.

Change from the log administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Security administrator role Change to the security administrator role. Role allowed access. Change from the security administrator role.

Change from the security administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Administrator's unprivileged user Change to the staff role. Role allowed access. Change from the staff role.

Change from the staff role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
General system administration role Change to the system administrator role. Role allowed access. Change from the system administrator role.

Change from the system administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Execute a shell in the sysadm domain. Domain allowed access. Execute a generic bin program in the sysadm domain. Domain allowed access. Execute all entrypoint files in the sysadm domain. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain allowed access.
Allow sysadm to execute a generic bin program in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute a generic bin program in a specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in.
Send a SIGCHLD signal to sysadm users. Domain allowed access. Inherit and use sysadm file descriptors Domain allowed access. Read and write sysadm user unnamed pipes. Domain allowed access.

Allow sysadm to debug or ptrace all processes.

No Interfaces Unconfiend user role Change from the unconfineduser role.

Change from the unconfineduser role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Transition to the unconfined domain. Domain allowed access. Execute specified programs in the unconfined domain. The type of the process performing this action. The role to allow the unconfined domain. Transition to the unconfined domain by executing a shell. Domain allowed access. Allow unconfined to execute the specified program in the specified domain.

Allow unconfined to execute the specified program in the specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Inherit file descriptors from the unconfined domain. Domain allowed access. Send a SIGCHLD signal to the unconfined domain. Domain allowed access. Send a SIGNULL signal to the unconfined domain. Domain allowed access. Send a SIGNULL signal to the unconfined execmem domain. Domain allowed access. Send a signal to the unconfined execmem domain. Domain allowed access. Send generic signals to the unconfined domain. Domain allowed access. Read unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read unconfined domain unnamed pipes. Domain allowed access. Read and write unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read and write unconfined domain unnamed pipes. Domain to not audit. Do not audit attempts to read and write unconfined domain netlink_route_socket. Domain to not audit. Do not audit attempts to read and write unconfined domain stream. Domain to not audit. Allow attempts to read and write unconfined domain stream. Domain to not audit. Connect to the unconfined domain using a unix domain stream socket. Domain allowed access. Do not audit attempts to read or write unconfined domain tcp sockets.

Do not audit attempts to read or write unconfined domain tcp sockets.

This interface was added due to a broken symptom in ldconfig.

Domain to not audit.
Do not audit attempts to read or write unconfined domain packet sockets.

Do not audit attempts to read or write unconfined domain packet sockets.

This interface was added due to a broken symptom.

Domain to not audit.
Create keys for the unconfined domain. Domain allowed access. Send messages to the unconfined domain over dbus. Domain allowed access. Send and receive messages from unconfined_t over dbus. Domain allowed access. Connect to the the unconfined DBUS for service (acquire_svc). Domain allowed access. Connect to the the unconfined DBUS Domain allowed access. Allow ptrace of unconfined domain Domain allowed access. Read and write to unconfined shared memory. The type of the process performing this action. Read and write to unconfined execmem shared memory. The type of the process performing this action. Transition to the unconfined_execmem domain. Domain allowed access. execute the execmem applications Domain allowed access. Allow apps to set rlimits on userdomain Domain allowed access. Get the process group of unconfined. Domain allowed access. Change to the unconfined role. Role allowed access. Allow domain to attach to TUN devices created by unconfined_t users. Domain allowed access.

Transition to confined nsplugin domains from unconfined user

Allow a user to login as an unconfined domain

Ignore unconfined mmap_zero errors

Allow unconfined users to transition to the Mozilla plugin domain when running xulrunner plugin-container.

Generic unprivileged user Change to the generic user role. Role allowed access. Change from the generic user role.

Change from the generic user role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Web administrator role Change to the web administrator role. Role allowed access. Change from the web administrator role.

Change from the web administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow webadm to manage files in users home directories

Allow webadm to read files in users home directories

Least priviledged X user Change to the xguest role. Role allowed access. Change from the xguest role.

Change from the xguest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow xguest users to mount removable media

Allow xguest to configure Network Manager and connect to apache ports

Allow xguest to use blue tooth devices