[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.145.170.164: ~ $
��|����|�SE Linux Modulevirt_vz1.0.0@;;$netlink_audit_socketnlmsg_relay
appendbindconnectcreatewritenlmsg_tty_auditrelabelfromioctl	name_bindnlmsg_readprivnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_read
tcp_socket
appendbindconnectcreatewriterelabelfrom
acceptfrom	connecttoioctl	name_bind	node_bindnewconnsendtorecv_msgsend_msggetattrsetattracceptgetoptname_connectreadsetoptshutdownrecvfromlock		relabelto
listen

msgq	associatecreatewrite	unix_readdestroygetattrsetattrread
enqueue
	unix_writedirrmdir
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_accessremove_namegetattrsetattradd_namereparentexecmodread
renamesearchlock		relabeltomountonopenquotaonswapon.peerrecvblk_file
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_accessgetattrsetattrexecmodread
renamelock		relabeltomountonopenquotaonswapon
chr_file
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_access
entrypointgetattrsetattrexecmodread
renamelock		relabeltoexecute_no_transmountonopenquotaonswapon		ipc	associatecreatewrite	unix_readdestroygetattrsetattrread
	unix_write	lnk_file
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_accessgetattrsetattrexecmodread
renamelock		relabeltomountonopenquotaonswapon4netlink_connector_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listenprocessgetcapsetcapsigstopptrace_childsigchldshareexecheap
setcurrentsetfscreatesetkeycreatesiginh
dyntransition
transitionfork
getsession
noatsecuresigkillsignull	setrlimitgetattr	getschedsetexec
setschedgetpgid
setpgidptrace	execstack	rlimitinh
setsockcreatesignalexecmem/capability2
epolwakeupmac_override	mac_admin
audit_readsyslog
block_suspend
wake_alarmcompromise_kernelfduse*packetforward_outflow_outsendrecv
forward_in	relabeltoflow_insocket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen	
fifo_file
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_accessgetattrsetattrexecmodread
renamelock		relabeltomountonopenquotaonswaponfile
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_access
entrypointgetattrsetattrexecmodread
renamelock		relabeltoexecute_no_transmountonopenquotaonswaponnode
rawip_recvtcp_recvudp_recv
rawip_sendtcp_sendudp_send	dccp_recv		dccp_sendenforce_destsendto
recvfrom!netlink_nflog_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen+keycreatewriteviewlinksetattrreadsearch5netlink_netfilter_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen2netlink_iscsi_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen netlink_tcpdiag_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_readunix_stream_socket
appendbindconnectcreatewriterelabelfrom
acceptfrom	connecttoioctl	name_bindnewconnsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen0kernel_servicecreate_files_asuse_as_overridenetlink_route_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_read8netlink_rdma_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen

shm	associatecreatewrite	unix_readdestroygetattrsetattrread
lock
	unix_write#netlink_selinux_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
  capability setfcap	setpcapfownersys_bootsys_tty_confignet_raw	sys_admin
sys_chroot
sys_module	sys_rawiodac_override	ipc_ownerkilldac_read_search	sys_pacct
net_broadcastnet_bind_servicesys_nicesys_timefsetidmknodsetgidsetuidlease	
net_adminaudit_write
linux_immutable
sys_ptrace
audit_controlipc_locksys_resourcechown%netlink_ip6fw_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_read,dccp_socket
appendbindconnectcreatewriterelabelfromioctl	name_bind	node_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptname_connectreadsetoptshutdownrecvfromlock		relabelto
listennetlink_firewall_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_read	sock_file
appendcreateexecutewriterelabelfromlinkunlinkioctlaudit_accessgetattrsetattrexecmodread
renamelock		relabeltomountonopenquotaonswaponunix_dgram_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen(netlink_kobject_uevent_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen


filesystem	associate
quotagetrelabelfrom
transitiongetattr	quotamodmountremountunmount	relabelto"netlink_xfrm_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindnlmsg_writesendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
nlmsg_read&netlink_dnrt_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen6netlink_generic_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen7netlink_scsitransport_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen:servicestopstatusdisableenablekillloadreloadstart
key_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen

netif
rawip_recvtcp_recvudp_recv
rawip_send
egress	ingresstcp_sendudp_send	dccp_recv	dccp_send
packet_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
-memprotect	mmap_zeromsgsendreceive
1tun_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msgattach_queuegetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen
udp_socket
appendbindconnectcreatewriterelabelfromioctl	name_bind	node_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen)appletalk_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen9netlink_crypto_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen;proxyreadrawip_socket
appendbindconnectcreatewriterelabelfromioctl	name_bind	node_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen'association
setcontextsendtorecvfrompolmatchnetlink_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listen		sem	associatecreatewrite	unix_readdestroygetattrsetattrread
	unix_write

systemstatusmodule_requestrebootdisable
enable		undefinedipc_info
killsyslog_readhaltreloadsyslog_console
syslog_mod3netlink_fib_lookup_socket
appendbindconnectcreatewriterelabelfromioctl	name_bindsendtorecv_msgsend_msggetattrsetattracceptgetoptreadsetoptshutdownrecvfromlock		relabelto
listensecuritycompute_membercompute_usercompute_create
setenforce
check_contextsetcheckreqprotcompute_relabel	setboolload_policyread_policy
setsecparam
compute_avobject_r@@@@system_r@@@@@@init_var_run_t@shadow_t@etc_t@sysfs_t@tmpfs_t@NetworkManager_exec_t	@systemd_systemctl_exec_t@@unconfined_login_domain@NetworkManager_unit_file_t	@virt_qemu_ga_t
@net_conf_t@systemd_logind_var_run_t@systemd_passwd_var_run_t@systemd_passwd_agent_exec_t@NetworkManager_t
@cgroup_t@passwd_t@bin_t@init_t@var_t@pidfile@systemd_passwd_agent_t
@systemd_unit_file_type	@var_lib_t	@var_run_ts0@c0c10ec100�c1000�c1010�c1020oc110yc120�c130�c140�c150�c160�c170�c180�c190c20�c200�c210�c220�c230�c240�c250c260c270c280#c290c30-c3007c310Ac320Kc330Uc340_c350ic360sc370}c380�c390)c40�c400�c410�c420�c430�c440�c450�c460�c470�c480�c4903c50�c500�c510	c520c530c540'c5501c560;c570Ec580Oc590=c60Yc600cc610mc620wc630�c640�c650�c660�c670�c680�c690Gc70�c700�c710�c720�c730�c740�c750�c760c770
c780c790Qc80!c800+c8105c820?c830Ic840Sc850]c860gc870qc880{c890[c90�c900�c910�c920�c930�c940�c950�c960�c970�c980�c990c1�c1001fc101�c1011�c1021c11pc111zc121�c131�c141�c151�c161�c171�c181�c191�c201c21�c211�c221�c231�c241�c251c261c271c281$c291.c301 c318c311Bc321Lc331Vc341`c351jc361tc371~c381�c391�c401*c41�c411�c421�c431�c441�c451�c461�c471�c481�c491�c5014c51c511
c521c531c541(c5512c561<c571Fc581Pc591Zc601>c61dc611nc621xc631�c641�c651�c661�c671�c681�c691�c701Hc71�c711�c721�c731�c741�c751�c761c771c781c791"c801Rc81,c8116c821@c831Jc841Tc851^c861hc871rc881|c891�c901\c91�c911�c921�c931�c941�c951�c961�c971�c981�c991�c1002�c1012gc102�c1022qc112
c12{c122�c132�c142�c152�c162�c172�c182�c192c2�c202�c212c22�c222�c232�c242�c252c262c272c282%c292/c3029c312!c32Cc322Mc332Wc342ac352kc362uc372c382�c392�c402�c412+c42�c422�c432�c442�c452�c462�c472�c482�c492�c502c5125c52c522c532c542)c5523c562=c572Gc582Qc592[c602ec612?c62oc622yc632�c642�c652�c662�c672�c682�c692�c702�c712Ic72�c722�c732�c742�c752�c762c772c782c792#c802-c812Sc827c822Ac832Kc842Uc852_c862ic872sc882}c892�c902�c912]c92�c922�c932�c942�c952�c962�c972�c982�c992�c1003�c1013c1023hc103rc113|c123c13�c133�c143�c153�c163�c173�c183�c193�c203�c213�c223c23�c233�c243�c253c263c273c283&c293c30c303:c313Dc323"c33Nc333Xc343bc353lc363vc373�c383�c393�c403�c413�c423,c43�c433�c443�c453�c463�c473�c483�c493�c503c513c5236c53c533 c543*c5534c563>c573Hc583Rc593\c603fc613pc623@c63zc633�c643�c653�c663�c673�c683�c693�c703�c713�c723Jc73�c733�c743�c753�c763c773c783c793$c803.c8138c823Tc83Bc833Lc843Vc853`c863jc873tc883~c893�c903�c913�c923^c93�c933�c943�c953�c963�c973�c983�c993�c1004�c1014ic104sc114}c124�c134c14�c144�c154�c164�c174�c184�c194�c204�c214�c224�c234c24�c244�c254	c264c274c284'c2941c304;c314Ec324Oc334#c34Yc344cc354mc364wc374�c384�c394c4�c404�c414�c424�c434-c44�c444�c454�c464�c474�c484�c494�c504c514
c524c5347c54!c544+c5545c564?c574Ic584Sc594]c604gc614qc624{c634Ac64�c644�c654�c664�c674�c684�c694�c704�c714�c724�c734Kc74�c744�c754�c764c774c784c794%c804/c8149c824Cc834Uc84Mc844Wc854ac864kc874uc884c894�c904�c914�c924�c934_c94�c944�c954�c964�c974�c984�c994�c1005�c1015jc105tc115~c125�c135�c145c15�c155�c165�c175�c185�c195�c205�c215�c225�c235�c245c25c255
c265c275c285(c2952c305<c315Fc325Pc335Zc345$c35dc355nc365xc375�c385�c395�c405�c415�c425�c435�c445.c45�c455�c465�c475�c485�c495c5�c505c515c525c535"c5458c55,c5556c565@c575Jc585Tc595^c605hc615rc625|c635�c645Bc65�c655�c665�c675�c685�c695�c705�c715�c725�c735�c745Lc75�c755�c765c775c785c795&c8050c815:c825Dc835Nc845Vc85Xc855bc865lc875vc885�c895�c905�c915�c925�c935�c945`c95�c955�c965�c975�c985�c995�c1006�c1016kc106uc116c126�c136�c146�c156c16�c166�c176�c186�c196�c206�c216�c226�c236�c246c256c26c266c276c286)c2963c306=c316Gc326Qc336[c346ec356%c36oc366yc376�c386�c396�c406�c416�c426�c436�c446�c456/c46�c466�c476�c486�c496�c506c516c526c536#c546-c5569c567c566Ac576Kc586Uc596c6_c606ic616sc626}c636�c646�c656Cc66�c666�c676�c686�c696�c706�c716�c726�c736�c746�c756Mc76�c766	c776c786c796'c8061c816;c826Ec836Oc846Yc856Wc86cc866mc876wc886�c896�c906�c916�c926�c936�c946�c956ac96�c966�c976�c986�c996�c1007�c1017lc107vc117�c127�c137�c147�c157�c167c17�c177�c187�c197�c207�c217�c227�c237�c247c257c267c27c277 c287*c2974c307>c317Hc327Rc337\c347fc357pc367&c37zc377�c387�c397�c407�c417�c427�c437�c447�c457�c4670c47�c477�c487�c497�c507c517c527c537$c547.c5578c567:c57Bc577Lc587Vc597`c607jc617tc627~c637�c647�c657�c667Dc67�c677�c687�c697c7�c707�c717�c727�c737�c747�c757c767Nc77
c777c787c797(c8072c817<c827Fc837Pc847Zc857dc867Xc87nc877xc887�c897�c907�c917�c927�c937�c947�c957�c967bc97�c977�c987�c997�c1008�c1018mc108wc118�c128�c138�c148�c158�c168�c178c18�c188�c198�c208�c218�c228�c238�c248c258
c268c278c28!c288+c2985c308?c318Ic328Sc338]c348gc358qc368{c378'c38�c388�c398�c408�c418�c428�c438�c448�c458�c468�c4781c48�c488�c498�c508c518c528c538%c548/c5589c568Cc578;c58Mc588Wc598ac608kc618uc628c638�c648�c658�c668�c678Ec68�c688�c698�c708�c718�c728�c738�c748�c758c768c778Oc78c788c798	c8)c8083c818=c828Gc838Qc848[c858ec868oc878Yc88yc888�c898�c908�c918�c928�c938�c948�c958�c968�c978cc98�c988�c998�c1009�c1019nc109xc119�c129�c139�c149�c159�c169�c179�c189c19�c199�c209�c219�c229�c239�c249c259c269c279"c289c29,c2996c309@c319Jc329Tc339^c349hc359rc369|c379�c389(c39�c399�c409�c419�c429�c439�c449�c459�c469�c479�c4892c49�c499�c509c519c529c539&c5490c559:c569Dc579Nc589<c59Xc599bc609lc619vc629�c639�c649�c659�c669�c679�c689Fc69�c699�c709�c719�c729�c739�c749�c759c769c779c789Pc79 c799*c8094c819>c829Hc839Rc849\c859fc869pc879zc889Zc89�c899
c9�c909�c919�c929�c939�c949�c959�c969�c979�c989dc99�c999[@@@@@@@P@@@@@@@	@@@@@@@P@@@@@@@P@@@@@ @ @@@@@@@@@@@ @@@@@@@@@@@@@
W@@@@@@@@@@@@@P@@@@@@@	@@@@@@@P@@@@@@@P@@@@@@S @@@@@@P@@@@@@SP@@@@@@P@@@@@@P@@@@@@P@@@@@@P@@@@@@S@@@@@@P@@@@@@	@@@@@@P@@@@@@P@@@@@@P@@@@@ @P@@@@@@@P@@@@@@SP@@@@@�@SP@@@@@@P@@@@@@S@@@@@@	@@@@@@@@@@@ @	@@@@@@	@@@@@ @P@@@@@@P@@@@@�@P@@@@@�@@@@@@@@@@@@@@@@@@@ @	@@@@@@	@@@@@ @P@@@@@@P@@@@@@P@@@@@@SP@@@@@ @	@@@@@@	@@@@@ @P@@@@@@P@@@@@@P@@@@@@S@@@@@@S @@@@@�@P@@@@@ @WV@@@@@ @@@@@@ @WV@@@@@ @@@@@@ @WV@@@@@ @
@@@@@@ @@@@@@@@@@@@@@@@@@@@@@�@S@@@@@�@:?@@@@@@SP@@@@@@S@@@@@@	@@@@@@@@@@@@@@@@@@�@P@@@@@�@P@@@@@@@SP@@@@@@@WV@@@@@@@@@@@@@@WV@@@@@@@	@@@@@@@~@@@@@�@P@@@@@�@P@@@@@@@SP@@@@@@@WV@@@@@@@~@@@@@@@@@@@@@@@@@@@@@@@@@@@�������@@@@���@@@@@��������@����������������������������������@����������������������������������@����������������������������������@��������������������������;@@�@@���@@�@@����@@�@@��?@@���@@@@��@@��?@@��@@��@@��@@��?@@���@@��@@��@@�@@�@@��?@@��?@@��?@@���@@��?@@�@@@@�@@�@@�@@���@@���@@���@@��?@@���@@��?@@���@@���@@��?@@@@��?@@��?@@@@@@���@@@@@@�@@@@��@@��?@@��?@@��?@@��?@@��?@@��?@@��?@@��?@@�@@@@@@@@@@;netlink_audit_socket
tcp_socketmsgqdirpeerblk_filechr_fileipclnk_filenetlink_connector_socketprocesscapability2fdpacketsocket	fifo_filefilenodenetlink_nflog_socketkeynetlink_netfilter_socketnetlink_iscsi_socketnetlink_tcpdiag_socketunix_stream_socketkernel_servicenetlink_route_socketnetlink_rdma_socketshmnetlink_selinux_socket
capabilitynetlink_ip6fw_socketdccp_socketnetlink_firewall_socket	sock_fileunix_dgram_socketnetlink_kobject_uevent_socket
filesystemnetlink_xfrm_socketnetlink_dnrt_socketnetlink_generic_socketnetlink_scsitransport_socketservice
key_socketnetif
packet_socket
memprotectmsg
tun_socket
udp_socketappletalk_socketnetlink_crypto_socketproxyrawip_socketassociationnetlink_socketsemsystemnetlink_fib_lookup_socketsecurityobject_rsystem_rinit_var_run_tshadow_tetc_tsysfs_ttmpfs_tNetworkManager_exec_tsystemd_systemctl_exec_tunconfined_login_domainNetworkManager_unit_file_tvirt_qemu_ga_t
net_conf_tsystemd_logind_var_run_tsystemd_passwd_var_run_tsystemd_passwd_agent_exec_tNetworkManager_tcgroup_tpasswd_tbin_tinit_tvar_tpidfilesystemd_passwd_agent_tsystemd_unit_file_type	var_lib_t	var_run_ts0c0c10c100c1000c1010c1020c110c120c130c140c150c160c170c180c190c20c200c210c220c230c240c250c260c270c280c290c30c300c310c320c330c340c350c360c370c380c390c40c400c410c420c430c440c450c460c470c480c490c50c500c510c520c530c540c550c560c570c580c590c60c600c610c620c630c640c650c660c670c680c690c70c700c710c720c730c740c750c760c770c780c790c80c800c810c820c830c840c850c860c870c880c890c90c900c910c920c930c940c950c960c970c980c990c1c1001c101c1011c1021c11c111c121c131c141c151c161c171c181c191c201c21c211c221c231c241c251c261c271c281c291c301c31c311c321c331c341c351c361c371c381c391c401c41c411c421c431c441c451c461c471c481c491c501c51c511c521c531c541c551c561c571c581c591c601c61c611c621c631c641c651c661c671c681c691c701c71c711c721c731c741c751c761c771c781c791c801c81c811c821c831c841c851c861c871c881c891c901c91c911c921c931c941c951c961c971c981c991c1002c1012c102c1022c112c12c122c132c142c152c162c172c182c192c2c202c212c22c222c232c242c252c262c272c282c292c302c312c32c322c332c342c352c362c372c382c392c402c412c42c422c432c442c452c462c472c482c492c502c512c52c522c532c542c552c562c572c582c592c602c612c62c622c632c642c652c662c672c682c692c702c712c72c722c732c742c752c762c772c782c792c802c812c82c822c832c842c852c862c872c882c892c902c912c92c922c932c942c952c962c972c982c992c1003c1013c1023c103c113c123c13c133c143c153c163c173c183c193c203c213c223c23c233c243c253c263c273c283c293c3c303c313c323c33c333c343c353c363c373c383c393c403c413c423c43c433c443c453c463c473c483c493c503c513c523c53c533c543c553c563c573c583c593c603c613c623c63c633c643c653c663c673c683c693c703c713c723c73c733c743c753c763c773c783c793c803c813c823c83c833c843c853c863c873c883c893c903c913c923c93c933c943c953c963c973c983c993c1004c1014c104c114c124c134c14c144c154c164c174c184c194c204c214c224c234c24c244c254c264c274c284c294c304c314c324c334c34c344c354c364c374c384c394c4c404c414c424c434c44c444c454c464c474c484c494c504c514c524c534c54c544c554c564c574c584c594c604c614c624c634c64c644c654c664c674c684c694c704c714c724c734c74c744c754c764c774c784c794c804c814c824c834c84c844c854c864c874c884c894c904c914c924c934c94c944c954c964c974c984c994c1005c1015c105c115c125c135c145c15c155c165c175c185c195c205c215c225c235c245c25c255c265c275c285c295c305c315c325c335c345c35c355c365c375c385c395c405c415c425c435c445c45c455c465c475c485c495c5c505c515c525c535c545c55c555c565c575c585c595c605c615c625c635c645c65c655c665c675c685c695c705c715c725c735c745c75c755c765c775c785c795c805c815c825c835c845c85c855c865c875c885c895c905c915c925c935c945c95c955c965c975c985c995c1006c1016c106c116c126c136c146c156c16c166c176c186c196c206c216c226c236c246c256c26c266c276c286c296c306c316c326c336c346c356c36c366c376c386c396c406c416c426c436c446c456c46c466c476c486c496c506c516c526c536c546c556c56c566c576c586c596c6c606c616c626c636c646c656c66c666c676c686c696c706c716c726c736c746c756c76c766c776c786c796c806c816c826c836c846c856c86c866c876c886c896c906c916c926c936c946c956c96c966c976c986c996c1007c1017c107c117c127c137c147c157c167c17c177c187c197c207c217c227c237c247c257c267c27c277c287c297c307c317c327c337c347c357c367c37c377c387c397c407c417c427c437c447c457c467c47c477c487c497c507c517c527c537c547c557c567c57c577c587c597c607c617c627c637c647c657c667c67c677c687c697c7c707c717c727c737c747c757c767c77c777c787c797c807c817c827c837c847c857c867c87c877c887c897c907c917c927c937c947c957c967c97c977c987c997c1008c1018c108c118c128c138c148c158c168c178c18c188c198c208c218c228c238c248c258c268c278c28c288c298c308c318c328c338c348c358c368c378c38c388c398c408c418c428c438c448c458c468c478c48c488c498c508c518c528c538c548c558c568c578c58c588c598c608c618c628c638c648c658c668c678c68c688c698c708c718c728c738c748c758c768c778c78c788c798c8c808c818c828c838c848c858c868c878c88c888c898c908c918c928c938c948c958c968c978c98c988c998c1009c1019c109c119c129c139c149c159c169c179c189c19c199c209c219c229c239c249c259c269c279c289c29c299c309c319c329c339c349c359c369c379c389c39c399c409c419c429c439c449c459c469c479c489c49c499c509c519c529c539c549c559c569c579c589c59c599c609c619c629c639c649c659c669c679c689c69c699c709c719c729c739c749c759c769c779c789c79c799c809c819c829c839c849c859c869c879c889c89c899c9c909c919c929c939c949c959c969c979c989c99c999��|�#
# Directory patterns (dir)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. directory type
#




























#
# Regular file patterns (file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#






























#
# Symbolic link patterns (lnk_file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#


























#
# (Un)named Pipes/FIFO patterns (fifo_file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#


























#
# (Un)named sockets patterns (sock_file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#
























#
# Block device node patterns (blk_file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#


























#
# Character device node patterns (chr_file)
#
# Parameters:
# 1. domain type
# 2. container (directory) type
# 3. file type
#


























#
# File type_transition patterns
#
# filetrans_add_pattern(domain,dirtype,newtype,class(es),[filename])
#


#
# filetrans_pattern(domain,dirtype,newtype,class(es),[filename])
#



#
# unix domain socket patterns
#



########################################
# 
# Support macros for sets of object classes and permissions
#
# This file should only have object class and permission set macros - they
# can only reference object classes and/or permissions.

#
# All directory and file classes
#


#
# All non-directory file classes.
#


#
# Non-device file classes.
#


#
# Device file classes.
#


#
# All socket classes.
#


#
# Datagram socket classes.
# 


#
# Stream socket classes.
#


#
# Unprivileged socket classes (exclude rawip, netlink, packet).
#


########################################
# 
# Macros for sets of permissions
#

#
# Permissions to mount and unmount file systems.
#


#
# Permissions for using sockets.
# 


#
# Permissions for creating and using sockets.
# 


#
# Permissions for using stream sockets.
# 


#
# Permissions for creating and using stream sockets.
# 


#
# Permissions for creating and using sockets.
# 


#
# Permissions for creating and using sockets.
# 



#
# Permissions for creating and using netlink sockets.
# 


#
# Permissions for using netlink sockets for operations that modify state.
# 


#
# Permissions for using netlink sockets for operations that observe state.
# 


#
# Permissions for sending all signals.
#


#
# Permissions for sending and receiving network packets.
#


#
# Permissions for using System V IPC
#










########################################
#
# New permission sets
#

#
# Directory (dir)
#















#
# Regular file (file)
#




















#
# Symbolic link (lnk_file)
#














#
# (Un)named Pipes/FIFOs (fifo_file)
#















#
# (Un)named Sockets (sock_file)
#














#
# Block device nodes (blk_file)
#















#
# Character device nodes (chr_file)
#















########################################
#
# Special permission sets
#

#
# Use (read and write) terminals
#



#
# Sockets
#



#
# Keys
#


#
# Service
#

#
# Specified domain transition patterns
#


# compatibility:




#
# Automatic domain transition patterns
#


# compatibility:




#
# Dynamic transition pattern
#


#
# Other process permissions
#


########################################
#
# Helper macros
#

#
# shiftn(num,list...)
#
# shift the list num times
#


#
# ifndef(expr,true_block,false_block)
#
# m4 does not have this.
#


#
# __endline__
#
# dummy macro to insert a newline.  used for 
# errprint, so the close parentheses can be
# indented correctly.
#


########################################
#
# refpolwarn(message)
#
# print a warning message
#


########################################
#
# refpolerr(message)
#
# print an error message.  does not
# make anything fail.
#


########################################
#
# gen_user(username, prefix, role_set, mls_defaultlevel, mls_range, [mcs_categories])
#


########################################
#
# gen_context(context,mls_sensitivity,[mcs_categories])
#

########################################
#
# can_exec(domain,executable)
#


########################################
#
# gen_bool(name,default_value)
#
































































































########################################
#
# gen_cats(N)
#
# declares categores c0 to c(N-1)
#




########################################
#
# gen_sens(N)
#
# declares sensitivites s0 to s(N-1) with dominance
# in increasing numeric order with s0 lowest, s(N-1) highest
#






########################################
#
# gen_levels(N,M)
#
# levels from s0 to (N-1) with categories c0 to (M-1)
#




########################################
#
# Basic level names for system low and high
#





########################################
#
# Macros for switching between source policy
# and loadable policy module support
#

##############################
#
# For adding the module statement
#


##############################
#
# For use in interfaces, to optionally insert a require block
#


# helper function, since m4 wont expand macros
# if a line is a comment (#):

##############################
#
# In the future interfaces should be in loadable modules
#
# template(name,rules)
#


##############################
#
# In the future interfaces should be in loadable modules
#
# interface(name,rules)
#




##############################
#
# Optional policy handling
#


##############################
#
# Determine if we should use the default
# tunable value as specified by the policy
# or if the override value should be used
#


##############################
#
# Extract booleans out of an expression.
# This needs to be reworked so expressions
# with parentheses can work.



##############################
#
# Tunable declaration
#


##############################
#
# Tunable policy handling
#


Filemanager

Name Type Size Permission Actions
kcare.pp File 66.98 KB 0600
libcare.pp File 78.07 KB 0600
virt_vz.pp File 73.79 KB 0644