Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.216.237.210
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
sepol /
[ HOME SHELL ]
Name
Size
Permission
Action
cil
[ DIR ]
drwxr-xr-x
policydb
[ DIR ]
drwxr-xr-x
boolean_record.h
1.51
KB
-rw-r--r--
booleans.h
1.53
KB
-rw-r--r--
context.h
752
B
-rw-r--r--
context_record.h
1.63
KB
-rw-r--r--
debug.h
975
B
-rw-r--r--
errcodes.h
851
B
-rw-r--r--
handle.h
1.36
KB
-rw-r--r--
ibendport_record.h
2.13
KB
-rw-r--r--
ibendports.h
1.35
KB
-rw-r--r--
ibpkey_record.h
2.25
KB
-rw-r--r--
ibpkeys.h
1.32
KB
-rw-r--r--
iface_record.h
1.8
KB
-rw-r--r--
interfaces.h
1.37
KB
-rw-r--r--
kernel_to_cil.h
125
B
-rw-r--r--
kernel_to_conf.h
126
B
-rw-r--r--
module.h
2.62
KB
-rw-r--r--
module_to_cil.h
329
B
-rw-r--r--
node_record.h
2.74
KB
-rw-r--r--
nodes.h
1.28
KB
-rw-r--r--
policydb.h
4.7
KB
-rw-r--r--
port_record.h
1.97
KB
-rw-r--r--
ports.h
1.28
KB
-rw-r--r--
roles.h
339
B
-rw-r--r--
sepol.h
862
B
-rw-r--r--
user_record.h
2.33
KB
-rw-r--r--
users.h
1.53
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : handle.h
#ifndef _SEPOL_HANDLE_H_ #define _SEPOL_HANDLE_H_ #ifdef __cplusplus extern "C" { #endif struct sepol_handle; typedef struct sepol_handle sepol_handle_t; /* Create and return a sepol handle. */ sepol_handle_t *sepol_handle_create(void); /* Get whether or not dontaudits will be disabled, same values as * specified by set_disable_dontaudit. This value reflects the state * your system will be set to upon commit, not necessarily its * current state.*/ int sepol_get_disable_dontaudit(sepol_handle_t * sh); /* Set whether or not to disable dontaudits, 0 is default and does * not disable dontaudits, 1 disables them */ void sepol_set_disable_dontaudit(sepol_handle_t * sh, int disable_dontaudit); /* Set whether module_expand() should consume the base policy passed in. * This should reduce the amount of memory required to expand the policy. */ void sepol_set_expand_consume_base(sepol_handle_t * sh, int consume_base); /* Destroy a sepol handle. */ void sepol_handle_destroy(sepol_handle_t *); /* Get whether or not needless unused branch of tunables would be preserved */ int sepol_get_preserve_tunables(sepol_handle_t * sh); /* Set whether or not to preserve the needless unused branch of tunables, * 0 is default and discard such branch, 1 preserves them */ void sepol_set_preserve_tunables(sepol_handle_t * sh, int preserve_tunables); #ifdef __cplusplus } #endif #endif
Close