Linux ip-172-26-7-228 5.4.0-1103-aws #111~18.04.1-Ubuntu SMP Tue May 23 20:04:10 UTC 2023 x86_64
Apache
: 172.26.7.228 | : 18.189.143.150
Cant Read [ /etc/named.conf ]
5.6.40-24+ubuntu18.04.1+deb.sury.org+1
www-data
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
include /
sepol /
[ HOME SHELL ]
Name
Size
Permission
Action
cil
[ DIR ]
drwxr-xr-x
policydb
[ DIR ]
drwxr-xr-x
boolean_record.h
1.51
KB
-rw-r--r--
booleans.h
2.19
KB
-rw-r--r--
context.h
752
B
-rw-r--r--
context_record.h
1.63
KB
-rw-r--r--
debug.h
975
B
-rw-r--r--
errcodes.h
852
B
-rw-r--r--
handle.h
1.36
KB
-rw-r--r--
ibendport_record.h
2.13
KB
-rw-r--r--
ibendports.h
1.35
KB
-rw-r--r--
ibpkey_record.h
2.25
KB
-rw-r--r--
ibpkeys.h
1.32
KB
-rw-r--r--
iface_record.h
1.8
KB
-rw-r--r--
interfaces.h
1.37
KB
-rw-r--r--
kernel_to_cil.h
125
B
-rw-r--r--
kernel_to_conf.h
126
B
-rw-r--r--
module.h
2.62
KB
-rw-r--r--
module_to_cil.h
329
B
-rw-r--r--
node_record.h
2.74
KB
-rw-r--r--
nodes.h
1.28
KB
-rw-r--r--
policydb.h
4.58
KB
-rw-r--r--
port_record.h
1.94
KB
-rw-r--r--
ports.h
1.28
KB
-rw-r--r--
roles.h
339
B
-rw-r--r--
sepol.h
862
B
-rw-r--r--
user_record.h
2.33
KB
-rw-r--r--
users.h
1.98
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : handle.h
#ifndef _SEPOL_HANDLE_H_ #define _SEPOL_HANDLE_H_ #ifdef __cplusplus extern "C" { #endif struct sepol_handle; typedef struct sepol_handle sepol_handle_t; /* Create and return a sepol handle. */ sepol_handle_t *sepol_handle_create(void); /* Get whether or not dontaudits will be disabled, same values as * specified by set_disable_dontaudit. This value reflects the state * your system will be set to upon commit, not necessarily its * current state.*/ int sepol_get_disable_dontaudit(sepol_handle_t * sh); /* Set whether or not to disable dontaudits, 0 is default and does * not disable dontaudits, 1 disables them */ void sepol_set_disable_dontaudit(sepol_handle_t * sh, int disable_dontaudit); /* Set whether module_expand() should consume the base policy passed in. * This should reduce the amount of memory required to expand the policy. */ void sepol_set_expand_consume_base(sepol_handle_t * sh, int consume_base); /* Destroy a sepol handle. */ void sepol_handle_destroy(sepol_handle_t *); /* Get whether or not needless unused branch of tunables would be preserved */ int sepol_get_preserve_tunables(sepol_handle_t * sh); /* Set whether or not to preserve the needless unused branch of tunables, * 0 is default and discard such branch, 1 preserves them */ void sepol_set_preserve_tunables(sepol_handle_t * sh, int preserve_tunables); #ifdef __cplusplus } #endif #endif
Close