Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib64 /
python3.9 /
site-packages /
setools /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
checker
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
diff
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
__init__.py
3.24
KB
-rw-r--r--
2023-12-07 15:49
boolquery.py
1.7
KB
-rw-r--r--
2023-12-07 15:49
boundsquery.py
1.8
KB
-rw-r--r--
2023-12-07 15:49
categoryquery.py
1.34
KB
-rw-r--r--
2023-12-07 15:49
commonquery.py
1.58
KB
-rw-r--r--
2023-12-07 15:49
constraintquery.py
4.99
KB
-rw-r--r--
2023-12-07 15:49
defaultquery.py
2.29
KB
-rw-r--r--
2023-12-07 15:49
descriptors.py
9.7
KB
-rw-r--r--
2023-12-07 15:49
devicetreeconquery.py
2.22
KB
-rw-r--r--
2023-12-07 15:49
dta.py
22.67
KB
-rw-r--r--
2023-12-07 15:49
exception.py
5.96
KB
-rw-r--r--
2023-12-07 15:49
fsusequery.py
2.8
KB
-rw-r--r--
2023-12-07 15:49
genfsconquery.py
3.18
KB
-rw-r--r--
2023-12-07 15:49
ibendportconquery.py
3.05
KB
-rw-r--r--
2023-12-07 15:49
ibpkeyconquery.py
4.89
KB
-rw-r--r--
2023-12-07 15:49
infoflow.py
15.54
KB
-rw-r--r--
2023-12-07 15:49
initsidquery.py
2.25
KB
-rw-r--r--
2023-12-07 15:49
iomemconquery.py
4
KB
-rw-r--r--
2023-12-07 15:49
ioportconquery.py
4.02
KB
-rw-r--r--
2023-12-07 15:49
mixins.py
6.82
KB
-rw-r--r--
2023-12-07 15:49
mlsrulequery.py
4.09
KB
-rw-r--r--
2023-12-07 15:49
netifconquery.py
2.4
KB
-rw-r--r--
2023-12-07 15:49
nodeconquery.py
3.9
KB
-rw-r--r--
2023-12-07 15:49
objclassquery.py
3.27
KB
-rw-r--r--
2023-12-07 15:49
pcideviceconquery.py
2.58
KB
-rw-r--r--
2023-12-07 15:49
perm_map
84.1
KB
-rw-r--r--
2023-12-07 15:49
permmap.py
16.2
KB
-rw-r--r--
2023-12-07 15:49
pirqconquery.py
2.48
KB
-rw-r--r--
2023-12-07 15:49
polcapquery.py
1.12
KB
-rw-r--r--
2023-12-07 15:49
policyrep.cpython-39-x86_64-linux-gnu.so
1.45
MB
-rwxr-xr-x
2024-04-03 16:13
policyrep.pyi
51.03
KB
-rw-r--r--
2023-12-07 15:49
portconquery.py
4.77
KB
-rw-r--r--
2023-12-07 15:49
py.typed
0
B
-rw-r--r--
2023-12-07 15:49
query.py
1.24
KB
-rw-r--r--
2023-12-07 15:49
rbacrulequery.py
5.33
KB
-rw-r--r--
2023-12-07 15:49
rolequery.py
1.95
KB
-rw-r--r--
2023-12-07 15:49
sensitivityquery.py
2.22
KB
-rw-r--r--
2023-12-07 15:49
terulequery.py
8.73
KB
-rw-r--r--
2023-12-07 15:49
typeattrquery.py
2.11
KB
-rw-r--r--
2023-12-07 15:49
typequery.py
2.95
KB
-rw-r--r--
2023-12-07 15:49
userquery.py
4.19
KB
-rw-r--r--
2023-12-07 15:49
util.py
7.59
KB
-rw-r--r--
2023-12-07 15:49
Save
Rename
# Copyright 2014-2015, Tresys Technology, LLC # # SPDX-License-Identifier: LGPL-2.1-only # import logging from typing import cast, Iterable, Optional, Set, Tuple from . import mixins, query from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .exception import RuleUseError, RuleNotConditional from .policyrep import AnyTERule, AVRuleXperm, IoctlSet, TERuletype from .util import match_indirect_regex, match_regex_or_set class TERuleQuery(mixins.MatchObjClass, mixins.MatchPermission, query.PolicyQuery): """ Query the Type Enforcement rules. Parameter: policy The policy to query. Keyword Parameters/Class attributes: ruletype The list of rule type(s) to match. source The name of the source type/attribute to match. source_indirect If true, members of an attribute will be matched rather than the attribute itself. Default is true. source_regex If true, regular expression matching will be used on the source type/attribute. Obeys the source_indirect option. Default is false. target The name of the target type/attribute to match. target_indirect If true, members of an attribute will be matched rather than the attribute itself. Default is true. target_regex If true, regular expression matching will be used on the target type/attribute. Obeys target_indirect option. Default is false. tclass The object class(es) to match. tclass_regex If true, use a regular expression for matching the rule's object class. Default is false. perms The set of permission(s) to match. perms_equal If true, the permission set of the rule must exactly match the permissions criteria. If false, any set intersection will match. Default is false. perms_regex If true, regular expression matching will be used on the permission names instead of set logic. Default is false. perms_subset If true, the rule matches if the permissions criteria is a subset of the rule's permission set. Default is false. default The name of the default type to match. default_regex If true, regular expression matching will be used on the default type. Default is false. boolean The set of boolean(s) to match. boolean_regex If true, regular expression matching will be used on the booleans. Default is false. boolean_equal If true, the booleans in the conditional expression of the rule must exactly match the criteria. If false, any set intersection will match. Default is false. """ ruletype = CriteriaSetDescriptor(enum_class=TERuletype) source = CriteriaDescriptor("source_regex", "lookup_type_or_attr") source_regex: bool = False source_indirect: bool = True target = CriteriaDescriptor("target_regex", "lookup_type_or_attr") target_regex: bool = False target_indirect: bool = True default = CriteriaDescriptor("default_regex", "lookup_type_or_attr") default_regex: bool = False boolean = CriteriaSetDescriptor("boolean_regex", "lookup_boolean") boolean_regex: bool = False boolean_equal: bool = False _xperms: Optional[IoctlSet] = None xperms_equal: bool = False @property def xperms(self) -> Optional[IoctlSet]: return self._xperms @xperms.setter def xperms(self, value: Optional[Iterable[Tuple[int, int]]]) -> None: if value: pending_xperms: Set[int] = set() for low, high in value: if not (0 <= low <= 0xffff): raise ValueError("{0:#07x} is not a valid ioctl.".format(low)) if not (0 <= high <= 0xffff): raise ValueError("{0:#07x} is not a valid ioctl.".format(high)) if high < low: high, low = low, high pending_xperms.update(i for i in range(low, high + 1)) self._xperms = IoctlSet(pending_xperms) else: self._xperms = None def __init__(self, policy, **kwargs) -> None: super(TERuleQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self) -> Iterable[AnyTERule]: """Generator which yields all matching TE rules.""" self.log.info("Generating TE rule results from {0.policy}".format(self)) self.log.debug("Ruletypes: {0.ruletype}".format(self)) self.log.debug("Source: {0.source!r}, indirect: {0.source_indirect}, " "regex: {0.source_regex}".format(self)) self.log.debug("Target: {0.target!r}, indirect: {0.target_indirect}, " "regex: {0.target_regex}".format(self)) self._match_object_class_debug(self.log) self._match_perms_debug(self.log) self.log.debug("Xperms: {0.xperms!r}, eq: {0.xperms_equal}".format(self)) self.log.debug("Default: {0.default!r}, regex: {0.default_regex}".format(self)) self.log.debug("Boolean: {0.boolean!r}, eq: {0.boolean_equal}, " "regex: {0.boolean_regex}".format(self)) for rule in self.policy.terules(): # # Matching on rule type # if self.ruletype: if rule.ruletype not in self.ruletype: continue # # Matching on source type # if self.source and not match_indirect_regex( rule.source, self.source, self.source_indirect, self.source_regex): continue # # Matching on target type # if self.target and not match_indirect_regex( rule.target, self.target, self.target_indirect, self.target_regex): continue # # Matching on object class # if not self._match_object_class(rule): continue # # Matching on permission set # try: if self.perms and rule.extended: if self.perms_equal and len(self.perms) > 1: # if criteria is more than one standard permission, # extended perm rules can never match if the # permission set equality option is on. continue if cast(AVRuleXperm, rule).xperm_type not in self.perms: continue elif not self._match_perms(rule): continue except RuleUseError: continue # # Matching on extended permissions # try: if self.xperms and not match_regex_or_set( rule.perms, self.xperms, self.xperms_equal, False): continue except RuleUseError: continue # # Matching on default type # if self.default: try: # because default type is always a single # type, hard-code indirect to True # so the criteria can be an attribute if not match_indirect_regex( rule.default, self.default, True, self.default_regex): continue except RuleUseError: continue # # Match on Boolean in conditional expression # if self.boolean: try: if not match_regex_or_set( rule.conditional.booleans, self.boolean, self.boolean_equal, self.boolean_regex): continue except RuleNotConditional: continue # if we get here, we have matched all available criteria yield rule