[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.149.254.35: ~ $
�
4��]c@s�dZdZdZdZdZdZdZdZdZd	Z	d
Z
dZdZdZ
dZd
ZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZ dZ!d Z"d!Z#d"Z$d#Z%d$Z&d%Z'd&Z(d'S((s�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
init_daemon_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)

permissive TEMPLATETYPE_t;
sO
type TEMPLATETYPE_initrc_exec_t;
init_script_file(TEMPLATETYPE_initrc_exec_t)
s#policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
domain_type(TEMPLATETYPE_t)
domain_entry_file(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role system_r types TEMPLATETYPE_t;

permissive TEMPLATETYPE_t;
s�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
inetd_service_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)

permissive TEMPLATETYPE_t;
sapolicy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

attribute_role TEMPLATETYPE_roles;
roleattribute system_r TEMPLATETYPE_roles;

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role TEMPLATETYPE_roles types TEMPLATETYPE_t;

permissive TEMPLATETYPE_t;
s�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

sandbox_x_domain_template(TEMPLATETYPE)

permissive TEMPLATETYPE_t;
permissive TEMPLATETYPE_client_t;

s�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

apache_content_template(TEMPLATETYPE)

permissive httpd_TEMPLATETYPE_script_t;
s�allow TEMPLATETYPE_t self:fifo_file rw_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
t
sO
optional_policy(`
	dbus_system_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
')
s�
allow TEMPLATETYPE_t self:fifo_file manage_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
s#
auth_use_nsswitch(TEMPLATETYPE_t)
s)
logging_send_syslog_msg(TEMPLATETYPE_t)
s)
sysnet_dns_name_resolve(TEMPLATETYPE_t)
s*
auth_domtrans_chk_passwd(TEMPLATETYPE_t)
s
mta_send_mail(TEMPLATETYPE_t)
sg
optional_policy(`
	dbus_system_bus_client(TEMPLATETYPE_t)
	dbus_connect_system_bus(TEMPLATETYPE_t)
')
s4
optional_policy(`
	kerberos_use(TEMPLATETYPE_t)
')
s{
optional_policy(`
	kerberos_keytab_template(TEMPLATETYPE, TEMPLATETYPE_t)
	kerberos_manage_host_rcache(TEMPLATETYPE_t)
')
s)
logging_send_audit_msgs(TEMPLATETYPE_t)
sj
optional_policy(`
	gen_require(`
		type USER_t;
		role USER_r;
	')

	TEMPLATETYPE_run(USER_t, USER_r)
')
s,
domain_use_interactive_fds(TEMPLATETYPE_t)
s&
files_read_etc_files(TEMPLATETYPE_t)
s-
miscfiles_read_localization(TEMPLATETYPE_t)
s.
## <summary>policy for TEMPLATETYPE</summary>s�

########################################
## <summary>
##	Execute TEMPLATETYPE_exec_t in the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
## <summary>
##	Domain allowed to transition.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_domtrans',`
	gen_require(`
		type TEMPLATETYPE_t, TEMPLATETYPE_exec_t;
	')

	corecmd_search_bin($1)
	domtrans_pattern($1, TEMPLATETYPE_exec_t, TEMPLATETYPE_t)
')

######################################
## <summary>
##	Execute TEMPLATETYPE in the caller domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_exec',`
	gen_require(`
		type TEMPLATETYPE_exec_t;
	')

	corecmd_search_bin($1)
	can_exec($1, TEMPLATETYPE_exec_t)
')
sk
########################################
## <summary>
##	Execute TEMPLATETYPE in the TEMPLATETYPE domain, and
##	allow the specified role the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	The role to be allowed the TEMPLATETYPE domain.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_run',`
	gen_require(`
		type TEMPLATETYPE_t;
		attribute_role TEMPLATETYPE_roles;
	')

	TEMPLATETYPE_domtrans($1)
	roleattribute $2 TEMPLATETYPE_roles;
')

########################################
## <summary>
##	Role access for TEMPLATETYPE
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	User domain for the role
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_role',`
	gen_require(`
		type TEMPLATETYPE_t;
		attribute_role TEMPLATETYPE_roles;
	')

	roleattribute $1 TEMPLATETYPE_roles;

	TEMPLATETYPE_domtrans($2)

	ps_process_pattern($2, TEMPLATETYPE_t)
	allow $2 TEMPLATETYPE_t:process { signull signal sigkill };
')
s�
########################################
## <summary>
##	Execute sandbox in the TEMPLATETYPE_t domain, and
##	allow the specified role the TEMPLATETYPE_t domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition.
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	The role to be allowed the TEMPLATETYPE_t domain.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_transition',`
	gen_require(`
		type TEMPLATETYPE_t;
		type TEMPLATETYPE_client_t;
	')

	allow $1 TEMPLATETYPE_t:process { signal_perms transition };
	dontaudit $1 TEMPLATETYPE_t:process { noatsecure siginh rlimitinh };
	role $2 types TEMPLATETYPE_t;
	role $2 types TEMPLATETYPE_client_t;

	allow TEMPLATETYPE_t $1:process { sigchld signull };
	allow TEMPLATETYPE_t $1:fifo_file rw_inherited_fifo_file_perms;
	allow TEMPLATETYPE_client_t $1:process { sigchld signull };
	allow TEMPLATETYPE_client_t $1:fifo_file rw_inherited_fifo_file_perms;
')
s>
########################################
## <summary>
##	Change to the TEMPLATETYPE role.
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_role_change',`
	gen_require(`
		role TEMPLATETYPE_r;
	')

	allow $1 TEMPLATETYPE_r;
')
s
########################################
## <summary>
##	Execute TEMPLATETYPE server in the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_initrc_domtrans',`
	gen_require(`
		type TEMPLATETYPE_initrc_exec_t;
	')

	init_labeled_script_domtrans($1, TEMPLATETYPE_initrc_exec_t)
')
s�
########################################
## <summary>
##	Send and receive messages from
##	TEMPLATETYPE over dbus.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_dbus_chat',`
	gen_require(`
		type TEMPLATETYPE_t;
		class dbus send_msg;
	')

	allow $1 TEMPLATETYPE_t:dbus send_msg;
	allow TEMPLATETYPE_t $1:dbus send_msg;
')
s�
########################################
## <summary>
##	All of the rules required to administrate
##	an TEMPLATETYPE environment
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_admin',`
	gen_require(`
		type TEMPLATETYPE_t;s�
	')

	allow $1 TEMPLATETYPE_t:process { signal_perms };
	ps_process_pattern($1, TEMPLATETYPE_t)

    tunable_policy(`deny_ptrace',`',`
        allow $1 TEMPLATETYPE_t:process ptrace;
    ')
s#
		type TEMPLATETYPE_initrc_exec_t;s�
	TEMPLATETYPE_initrc_domtrans($1)
	domain_system_change_exemption($1)
	role_transition $2 TEMPLATETYPE_initrc_exec_t system_r;
	allow $2 system_r;
sb	optional_policy(`
		systemd_passwd_agent_exec($1)
		systemd_read_fifo_file_passwd_run($1)
	')
')
sEEXECUTABLE		--	gen_context(system_u:object_r:TEMPLATETYPE_exec_t,s0)
s #  No file context, leave blank
sKEXECUTABLE	--	gen_context(system_u:object_r:TEMPLATETYPE_initrc_exec_t,s0)
N()tte_daemon_typestte_initscript_typestte_dbusd_typestte_inetd_typestte_userapp_typestte_sandbox_typestte_cgi_typestte_daemon_rulestte_inetd_rulestte_dbusd_rulestte_userapp_rulestte_cgi_rulestte_sandbox_rulestte_uid_rulestte_syslog_rulestte_resolve_rulestte_pam_rulest
te_mail_rulest
te_dbus_rulestte_kerberos_rulestte_manage_krb5_rcache_rulestte_audit_rulestte_run_rulestte_fd_rulestte_etc_rulestte_localization_rulestif_heading_rulestif_program_rulestif_user_program_rulestif_sandbox_rulestif_role_change_rulestif_initscript_rulest
if_dbus_rulestif_begin_admintif_middle_admintif_initscript_admin_typestif_initscript_admintif_end_admint
fc_programtfc_usert
fc_initscript(((sC/usr/lib64/python2.7/site-packages/sepolicy/templates/executable.pyt<module>$sP
)9#

Filemanager

Name Type Size Permission Actions
.__init__.pyo.40009 File 152 B 0644
.boolean.pyo.40009 File 331 B 0644
.etc_rw.pyo.40009 File 2.87 KB 0644
.executable.pyo.40009 File 8.99 KB 0644
.network.pyo.40009 File 12.58 KB 0644
.rw.pyo.40009 File 2.93 KB 0644
.script.pyo.40009 File 3.39 KB 0644
.semodule.pyo.40009 File 479 B 0644
.spec.pyo.40009 File 2.26 KB 0644
.test_module.pyo.40009 File 2.76 KB 0644
.tmp.pyo.40009 File 2.58 KB 0644
.unit_file.pyo.40009 File 1.2 KB 0644
.user.pyo.40009 File 3.49 KB 0644
.var_cache.pyo.40009 File 3.06 KB 0644
.var_lib.pyo.40009 File 3.2 KB 0644
.var_log.pyo.40009 File 2.16 KB 0644
.var_run.pyo.40009 File 2.09 KB 0644
.var_spool.pyo.40009 File 3.04 KB 0644
__init__.py File 724 B 0644
__init__.pyc File 152 B 0644
__init__.pyo File 152 B 0644
boolean.py File 1.15 KB 0644
boolean.pyc File 331 B 0644
boolean.pyo File 331 B 0644
etc_rw.py File 3.86 KB 0644
etc_rw.pyc File 2.87 KB 0644
etc_rw.pyo File 2.87 KB 0644
executable.py File 9.66 KB 0644
executable.pyc File 8.99 KB 0644
executable.pyo File 8.99 KB 0644
network.py File 13.28 KB 0644
network.pyc File 12.58 KB 0644
network.pyo File 12.58 KB 0644
rw.py File 3.84 KB 0644
rw.pyc File 2.93 KB 0644
rw.pyo File 2.93 KB 0644
script.py File 4.16 KB 0644
script.pyc File 3.39 KB 0644
script.pyo File 3.39 KB 0644
semodule.py File 1.28 KB 0644
semodule.pyc File 479 B 0644
semodule.pyo File 479 B 0644
spec.py File 2.09 KB 0644
spec.pyc File 2.26 KB 0644
spec.pyo File 2.26 KB 0644
test_module.py File 4.35 KB 0644
test_module.pyc File 2.76 KB 0644
test_module.pyo File 2.76 KB 0644
tmp.py File 3.38 KB 0644
tmp.pyc File 2.58 KB 0644
tmp.pyo File 2.58 KB 0644
unit_file.py File 2.21 KB 0644
unit_file.pyc File 1.2 KB 0644
unit_file.pyo File 1.2 KB 0644
user.py File 4.21 KB 0644
user.pyc File 3.49 KB 0644
user.pyo File 3.49 KB 0644
var_cache.py File 4.05 KB 0644
var_cache.pyc File 3.06 KB 0644
var_cache.pyo File 3.06 KB 0644
var_lib.py File 4.2 KB 0644
var_lib.pyc File 3.2 KB 0644
var_lib.pyo File 3.2 KB 0644
var_log.py File 3.18 KB 0644
var_log.pyc File 2.16 KB 0644
var_log.pyo File 2.16 KB 0644
var_run.py File 2.86 KB 0644
var_run.pyc File 2.09 KB 0644
var_run.pyo File 2.09 KB 0644
var_spool.py File 4.04 KB 0644
var_spool.pyc File 3.04 KB 0644
var_spool.pyo File 3.04 KB 0644