晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
|
Server : Apache System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64 User : rainic ( 1014) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /usr/lib/python3.6/site-packages/sepolicy/templates/ |
Upload File : |
# Copyright (C) 2007-2012 Red Hat
# see file 'COPYING' for use and warranty information
#
# policygentool is a tool for the initial generation of SELinux policy
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License as
# published by the Free Software Foundation; either version 2 of
# the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
# 02111-1307 USA
#
#
########################### Type Enforcement File #############################
te_daemon_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
init_daemon_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
permissive TEMPLATETYPE_t;
"""
te_initscript_types="""
type TEMPLATETYPE_initrc_exec_t;
init_script_file(TEMPLATETYPE_initrc_exec_t)
"""
te_dbusd_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
domain_type(TEMPLATETYPE_t)
domain_entry_file(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role system_r types TEMPLATETYPE_t;
permissive TEMPLATETYPE_t;
"""
te_inetd_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
inetd_service_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
permissive TEMPLATETYPE_t;
"""
te_userapp_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
attribute_role TEMPLATETYPE_roles;
roleattribute system_r TEMPLATETYPE_roles;
type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role TEMPLATETYPE_roles types TEMPLATETYPE_t;
permissive TEMPLATETYPE_t;
"""
te_sandbox_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
sandbox_x_domain_template(TEMPLATETYPE)
permissive TEMPLATETYPE_t;
permissive TEMPLATETYPE_client_t;
"""
te_cgi_types="""\
policy_module(TEMPLATETYPE, 1.0.0)
########################################
#
# Declarations
#
apache_content_template(TEMPLATETYPE)
permissive httpd_TEMPLATETYPE_script_t;
"""
te_daemon_rules="""\
allow TEMPLATETYPE_t self:fifo_file rw_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
"""
te_inetd_rules="""
"""
te_dbusd_rules="""
optional_policy(`
dbus_system_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
')
"""
te_userapp_rules="""
allow TEMPLATETYPE_t self:fifo_file manage_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
"""
te_cgi_rules="""
"""
te_sandbox_rules="""
"""
te_uid_rules="""
auth_use_nsswitch(TEMPLATETYPE_t)
"""
te_syslog_rules="""
logging_send_syslog_msg(TEMPLATETYPE_t)
"""
te_resolve_rules="""
sysnet_dns_name_resolve(TEMPLATETYPE_t)
"""
te_pam_rules="""
auth_domtrans_chk_passwd(TEMPLATETYPE_t)
"""
te_mail_rules="""
mta_send_mail(TEMPLATETYPE_t)
"""
te_dbus_rules="""
optional_policy(`
dbus_system_bus_client(TEMPLATETYPE_t)
dbus_connect_system_bus(TEMPLATETYPE_t)
')
"""
te_kerberos_rules="""
optional_policy(`
kerberos_use(TEMPLATETYPE_t)
')
"""
te_manage_krb5_rcache_rules="""
optional_policy(`
kerberos_keytab_template(TEMPLATETYPE, TEMPLATETYPE_t)
kerberos_manage_host_rcache(TEMPLATETYPE_t)
')
"""
te_audit_rules="""
logging_send_audit_msgs(TEMPLATETYPE_t)
"""
te_run_rules="""
optional_policy(`
gen_require(`
type USER_t;
role USER_r;
')
TEMPLATETYPE_run(USER_t, USER_r)
')
"""
te_fd_rules="""
domain_use_interactive_fds(TEMPLATETYPE_t)
"""
te_etc_rules="""
files_read_etc_files(TEMPLATETYPE_t)
"""
te_localization_rules="""
miscfiles_read_localization(TEMPLATETYPE_t)
"""
########################### Interface File #############################
if_heading_rules="""
## <summary>policy for TEMPLATETYPE</summary>"""
if_program_rules="""
########################################
## <summary>
## Execute TEMPLATETYPE_exec_t in the TEMPLATETYPE domain.
## </summary>
## <param name=\"domain\">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_domtrans',`
gen_require(`
type TEMPLATETYPE_t, TEMPLATETYPE_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, TEMPLATETYPE_exec_t, TEMPLATETYPE_t)
')
######################################
## <summary>
## Execute TEMPLATETYPE in the caller domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_exec',`
gen_require(`
type TEMPLATETYPE_exec_t;
')
corecmd_search_bin($1)
can_exec($1, TEMPLATETYPE_exec_t)
')
"""
if_user_program_rules="""
########################################
## <summary>
## Execute TEMPLATETYPE in the TEMPLATETYPE domain, and
## allow the specified role the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed the TEMPLATETYPE domain.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_run',`
gen_require(`
type TEMPLATETYPE_t;
attribute_role TEMPLATETYPE_roles;
')
TEMPLATETYPE_domtrans($1)
roleattribute $2 TEMPLATETYPE_roles;
')
########################################
## <summary>
## Role access for TEMPLATETYPE
## </summary>
## <param name="role">
## <summary>
## Role allowed access
## </summary>
## </param>
## <param name="domain">
## <summary>
## User domain for the role
## </summary>
## </param>
#
interface(`TEMPLATETYPE_role',`
gen_require(`
type TEMPLATETYPE_t;
attribute_role TEMPLATETYPE_roles;
')
roleattribute $1 TEMPLATETYPE_roles;
TEMPLATETYPE_domtrans($2)
ps_process_pattern($2, TEMPLATETYPE_t)
allow $2 TEMPLATETYPE_t:process { signull signal sigkill };
')
"""
if_sandbox_rules="""
########################################
## <summary>
## Execute sandbox in the TEMPLATETYPE_t domain, and
## allow the specified role the TEMPLATETYPE_t domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed to transition.
## </summary>
## </param>
## <param name="role">
## <summary>
## The role to be allowed the TEMPLATETYPE_t domain.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_transition',`
gen_require(`
type TEMPLATETYPE_t;
type TEMPLATETYPE_client_t;
')
allow $1 TEMPLATETYPE_t:process { signal_perms transition };
dontaudit $1 TEMPLATETYPE_t:process { noatsecure siginh rlimitinh };
role $2 types TEMPLATETYPE_t;
role $2 types TEMPLATETYPE_client_t;
allow TEMPLATETYPE_t $1:process { sigchld signull };
allow TEMPLATETYPE_t $1:fifo_file rw_inherited_fifo_file_perms;
allow TEMPLATETYPE_client_t $1:process { sigchld signull };
allow TEMPLATETYPE_client_t $1:fifo_file rw_inherited_fifo_file_perms;
')
"""
if_role_change_rules="""
########################################
## <summary>
## Change to the TEMPLATETYPE role.
## </summary>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_role_change',`
gen_require(`
role TEMPLATETYPE_r;
')
allow $1 TEMPLATETYPE_r;
')
"""
if_initscript_rules="""
########################################
## <summary>
## Execute TEMPLATETYPE server in the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_initrc_domtrans',`
gen_require(`
type TEMPLATETYPE_initrc_exec_t;
')
init_labeled_script_domtrans($1, TEMPLATETYPE_initrc_exec_t)
')
"""
if_dbus_rules="""
########################################
## <summary>
## Send and receive messages from
## TEMPLATETYPE over dbus.
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_dbus_chat',`
gen_require(`
type TEMPLATETYPE_t;
class dbus send_msg;
')
allow $1 TEMPLATETYPE_t:dbus send_msg;
allow TEMPLATETYPE_t $1:dbus send_msg;
')
"""
if_begin_admin="""
########################################
## <summary>
## All of the rules required to administrate
## an TEMPLATETYPE environment
## </summary>
## <param name="domain">
## <summary>
## Domain allowed access.
## </summary>
## </param>
## <param name="role">
## <summary>
## Role allowed access.
## </summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_admin',`
gen_require(`
type TEMPLATETYPE_t;"""
if_middle_admin="""
')
allow $1 TEMPLATETYPE_t:process { signal_perms };
ps_process_pattern($1, TEMPLATETYPE_t)
tunable_policy(`deny_ptrace',`',`
allow $1 TEMPLATETYPE_t:process ptrace;
')
"""
if_initscript_admin_types="""
type TEMPLATETYPE_initrc_exec_t;"""
if_initscript_admin="""
TEMPLATETYPE_initrc_domtrans($1)
domain_system_change_exemption($1)
role_transition $2 TEMPLATETYPE_initrc_exec_t system_r;
allow $2 system_r;
"""
if_end_admin="""\
optional_policy(`
systemd_passwd_agent_exec($1)
systemd_read_fifo_file_passwd_run($1)
')
')
"""
########################### File Context ##################################
fc_program="""\
EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_exec_t,s0)
"""
fc_user="""\
# No file context, leave blank
"""
fc_initscript="""\
EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_initrc_exec_t,s0)
"""