HEX
Server: Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
System: Linux golden.server-sky-dns.com 3.10.0-1160.59.1.el7.x86_64 #1 SMP Mon Mar 7 01:49:29 EST 2022 x86_64
User: arkitgroups (1041)
PHP: 8.2.8
Disabled: NONE
Upload Files
File: //lib/cwpsecure/init_policy
ELF>�"@@��@8	@@@@@@��88@8@@@<�<� ��`�`X�# (�(�`(�`��TT@T@DDP�td��@�@��Q�tdR�td��`�`��/lib64/ld-linux-x86-64.so.2GNU GNU
\.��P-nRZ��k�''9�2��@H�u��g�)�'o�7 `���0�ZN	T���|���`libc.so.6chrootexitstrncmpstrrchr__strdup__isoc99_sscanfstrncpymkdirfsyncpopenchmodstrtolsymlinkfgetsstrlenstrstr__errno_locationchdirfputcfcloserealpath__lxstat64stderrfilenopclosefwriterenamelocaltimestrchrfprintfscandir64fopen64accessstrcmp__libc_start_mainsnprintffree__gmon_start__GLIBC_2.7GLIBC_2.3GLIBC_2.2.5ii
Fii
Pui	Z��`��`'�` �`(�`0�`8�`@�`H�`P�`X�`	`�`
h�`p�`x�`
��`��`��`��`��`��`��`��`��`�`�`�`�`�`�`��`�`�` �`!�`" �`#(�`$0�`%8�`&H��H�ͳ H��t�kH����5³ �%ij @�%³ h����%�� h�����%�� h����%�� h����%�� h����%�� h����%�� h����%�� h�p����%�� h�`����%z� h	�P����%r� h
�@����%j� h�0����%b� h� ����%Z� h
�����%R� h�����%J� h���%B� h����%:� h�����%2� h����%*� h����%"� h����%� h����%� h����%
� h�p����%� h�`����%�� h�P����%� h�@����%� h�0����%� h� ����%ڲ h�����%Ҳ h�����%ʲ h���%² h ����%�� h!�����%�� h"����%�� h#����%�� h$����%R� f�AWAVAUATUSH��X�����G�H�nE1�A�D5@A�L�t��@L�{H��L9�tTH�]�;-�~H��L��L�����`5@�H���tĿl5@�H����_H���^� L9�u�M���)L��L�d$0���H�=� H�ÿ��`1��H�1��Q���H�|$(H�D$(����H�|$0H�ƹ1��d�FD�ND�F�A�����L��D$�F�Ѻ�5@�D$�F��$1��A���H�=± ������mH�
�� ���6@�r���L�-�� H���C���t%</u��C���L���w���H���C�/�C���u�L���_���XL���������H�36@��+@�x���1�I6@�,@�a����k6@�\6@�J�����6@�x6@�3������6@��������6@�������L���������6@L����������6@L��������L��������~��4@������lH�
4� ����6@� ���H�=A� �t���������6@�b������������P��������������dH�=ۯ ��������H�=ǯ �������H�=�� ������H�=�� �������cH�=�� ������M1��?f�H��H���d�����u��7@����������H�='� H�ھJ5@1���#���H��X��[]A\A]A^A_�f��{-H�CHD��q�����~5@�
H���u�� �7�����5@�H���t7��5@�
H���tk��5@�
H���u0H��
H�j� ��DH�{�
1������� �������5@H���c�������	H��H�� ���H�{
�
1��[����E� �����4@�v���������|�����6@�_���������������9@������������6@��9@���H��H��H�
­ ���6���3@���H��	��F@�������9@����1�����9@@�ƺ�9@H����P���H�
\� �$��8,@�H�������6@�i�����6@������XH�
 � ����6@�����
�����6@�]�������������9@������t�����6@��9@���H��H��H�
¬ ��
�9���3@���H�ٺ:�� O@�������9@����1�����9@@�ƺ�9@H��������6@������������9@�����������6@��9@�K���H��H��H�
� ���5��p3@����H�ٺ	��`]@�������9@�n���1�����9@@�ƺ�9@H���d�A�����6@������������}9@�N�����������6@��9@���H��H��H�
z� �Z�9��03@�`���H�ٺ|H���f@�I�������9@����1����}9@@�ƺ�9@H��������Q9@������^�����6@�[9@����H��H��H�
� �2���d9@����H�ٺ)��X2@���H�ٺ'���2@���H�ٺ'���2@���H�ٺ'���2@�r����Q9@�[9@�H��������k6@������������6@�9@�P���H��H��H�
#� ��
���9@�	����=$� tH��� 09@H�ٺ��79@����H��� L�
�� H��L��� �
�� ��/@��� H�$1����H�{� L�
|� H��L�Z� �
\� �h0@�U� H�$1����H�G� L�
H� H��L�&� �
(� �1@�!� H�$1��R���H�� L�
� H��L�� �
� ��1@�� H�$1������k6@�9@�H����8������6@�����������6@�^8@���H��H��H�
�� �;	���j8@���1���8@���H��H��H�¾�8@1���H��H�߾�8@1���H��H�߾�8@1��p�H��H�߾�8@1��^�H��H�߾�8@1��L��6@�^8@�H����
�V�����I6@����/�����6@�18@��H��H��H�
� �����C8@����
� �� H�߾X/@1����I6@�18@�H���?
�����36@�;���������6@��6@��H��H��� H�
c� �����6@�I��E@H�y� �6@f�H�;1��f�H��I��tH���6
L�����H��H��F@u�H�=B� ��,@�7@1���H�=*� ��,@�7@1�����7@�r������;@�7@�k�H��H�D$��H��� ��C@DH�;1���H��I��tFH�
�� ���07@�[�L���s	H�
�� �G7@���8�L����H��H���E@u�E1�L�����`�H�H�T$�����`���H�����
���`�T�H������T7@���`���H��t�H�x1���H��H��t�A��C@A�DI�/H�����Lc�H��H��L�����u(J�4+�Y7@L���uJ�|+�f7@�q�H���FI��I���E@u��/H�����H��I��H��1����1�L��H��L�y���H�
T� �07@��M������]7@L��������A����Mc�J�D;��8.���xs���xo���xuH��A�F�H�
�� ���d7@���]1��T�`��5@H���������P�`��5@H���������H�UH�=?� ��5@��@�����H���CH�5d� �
���H��������A�55@���H�|$��H�=1� �j7@�7@1����H�=� ��7@�7@1����H�=� ��,@�7@1���H�=�� �-@�7@1���H�=�� ��7@�7@1���H�=�� �0-@�7@1��p�H�=�� �P-@�7@1��X�H�=�� �x-@�7@1��@�H�=q� ��-@�7@1��(�H�=Y� ��-@�7@1���H�=A� ��7@�7@1���H�=)� �.@�7@1����H�=� ��7@�7@1����H�=�� �(.@�7@1���H�=�� �P.@�7@1���H�=�� �x.@�7@1���H�=�� ��.@�7@1��h�H�=�� ��.@�7@1��P���1���7@�o�H��I����1ɺ�#@L��H��H�K� �4@����A��xq1��A����H�D$0H��J�<(��A9�~BH�D$0L��8@�����`L�,�L��1�E�`I���G�E��u��A���H�|$0�^�L���V�H��� �4@�@B@�@L���8�H��H���C@t-H�;1���H��I��t�H�������u�L���P뾹1����`H�W� ��A@�H��DH��H��0B@tML�#1�L���.�H��H��t޺�H�ƿ��`���H����L���`����u��vfD�H�� 1�H���A@1����H��H��tFH�
� ���	8@�p�H���H�
�� �8@���M�H����H��H��u�H�
|� �)��/@� ���H�=\� ��36@��6@�H�?� �����`����������`��������"7@�m������������!��02@������$���/@������$���/@�j����#��0/@�Q��r��&��`,@�8��I��(��3@�����(��3@���o��(��3@�������(��3@����e�H�
Ȟ �5@�������1�I��^H��H���PTI��+@H�+@H�ǰ@�a��o�`UH-h�`H��H��w]øH��t�]�h�`����h�`UH-h�`H��H��H��H��?H�H�u]úH��t�]H�ƿh�`����=� uUH���~���]��� ��@H�=�� t�H��tU� �`H���]�{����s���1��G�u(�.�u �W0���t��.�u1����fD��@f.��W��
t
1���u-�.�u"�W0���t��.�u1�������@f.�SH�P� H������u��4@�r���tH�=� H�ھ�+@1���1�[ø[�f.�H�� SH��H��tH�=� ��4@1������4@�H������H���S���t+��\���B�<]wTH�5ż ��H���1��S���u�H�5�� H������4@����[H�5�� �
��D�Љ�H�=m� ��������D�@0�҃�0��0��4@1����[���H�59� �\��H�5(� �\���1����H�
� ����4@H��������@H�
� �	���4@��H�=Ż �8���[�f.�ATUS��C@H��H��H�;��;@�p�H��I��tC1��H���H�L���H����L���`��
H�����H��t��<$uH��H���C@u�H��[]A\�1�H���"�H��I��tվ�4@H�������uL�����빾L���a���u�L��H�ߺ �4@������H����1҅�t�l�1҃8��ډ�H��Ðf.�AUI��ATI��U��SH��H�����������uH���s���u@��u%H�
#� ���5@H��[]A\A]��L��L�������u�H�
� ���5@��@f.�H�������1҅�t��1҃8��ډ�H���fDH�����`�H���g�1҅�u1�D$�%�=�t=@�t1�=��
DА��H�Ę�fDAW1ɺ$@���`AVAUATUSH��(H�t$������A���`A�I����������!ʁ ��t����€�D�I�NLD��I��I��`��E������Mc�A��L�,�Ic�M)�1�I���`H�$�)fD@��tS@��
t|H�D$H�<H���J�L9�tEH�D$�8@L��L��L�<1�A�oI�O���@��u������@��u������H�|$��H��([]A\A]A^A_��A�G<Kt<S�s���A�G��0<	�c���A�G��0<	�S�������`�����<���1����`��H��H�$H��ƀ��`�����/���`�F�H�
׷ ���5@H�D$�v�L�L$M�����!5@�L�����A�A�PЀ�v<S��A�y.��A�yd��A�y��A����`L�L$�*���H�
K� ���%5@���L�L$A�/H�
'� ���-5@���I����H�5� � �q�H������H�5� �
�X�H���`�������`�����f.�@AWA��AVI��AUI��ATL�%� UH�-� SL)�1�H��H�����H��t�L��L��D��A��H��H9�u�H��[]A\A]A^A_Ðf.���H��H���ERROR: Can't chdir to %s/policy/current/ directory.
policy/current/exception_policy.confpolicy/current/domain_policy.confCreating configuration directory... ERROR: Can't create exception policy.
acl_group 0 file read proc:/self/\*acl_group 0 file read proc:/self/\{\*\}/\*path_group ANY_PATHNAME /\{\*\}/path_group ANY_PATHNAME /\{\*\}/\*path_group ANY_PATHNAME \*:/\*path_group ANY_PATHNAME \*:/\{\*\}/path_group ANY_PATHNAME \*:/\{\*\}/\*path_group ANY_PATHNAME \*:[\$]path_group ANY_PATHNAME socket:[family=\$:type=\$:protocol=\$]path_group ANY_DIRECTORY /\{\*\}/path_group ANY_DIRECTORY \*:/\{\*\}/number_group COMMON_IOCTL_CMDS 0x5401acl_group 0 file ioctl @ANY_PATHNAME @COMMON_IOCTL_CMDSacl_group 0 file read @ANY_DIRECTORYacl_group 0 file getattr @ANY_PATHNAMEaggregator proc:/self/exe /proc/self/exe
ERROR: Can't create domain policy.
<kernel>
use_profile %u
use_group %u
ERROR: Can't create manager policy.
ERROR: Can't create profile policy.
0-COMMENT=-----Disabled Mode-----
0-PREFERENCE={ max_audit_log=%u max_learning_entry=%u }
0-CONFIG%s={ mode=disabled grant_log=%s reject_log=%s }
1-COMMENT=-----Learning Mode-----
1-PREFERENCE={ max_audit_log=%u max_learning_entry=%u }
1-CONFIG%s={ mode=learning grant_log=%s reject_log=%s }
2-COMMENT=-----Permissive Mode-----
2-PREFERENCE={ max_audit_log=%u max_learning_entry=%u }
2-CONFIG%s={ mode=permissive grant_log=%s reject_log=%s }
3-COMMENT=-----Enforcing Mode-----
3-PREFERENCE={ max_audit_log=%u max_learning_entry=%u }
3-CONFIG%s={ mode=enforcing grant_log=%s reject_log=%s }
ERROR: Can't create stat policy.
# Memory quota (byte). 0 means no quota.
Memory used by policy:               0
Memory used by audit log:     16777216
Memory used by query message:  1048576
ERROR: Can't create configuration file.
Creating configuration file for cwpsecure-editpolicy ... Creating configuration file for cwpsecure-auditd ... Creating configuration file for cwpsecure-patternize ... Creating configuration file for cwpsecure-notifyd ... /usr/lib/gconv/gconv-modules.cache/usr/lib32/gconv/gconv-modules.cache/usr/lib64/gconv/gconv-modules.cache/usr/share/locale/locale.aliaspolicy/current/%s /proc/proc:\%c%c%cinitialize_domain from any/bin/truefailed.
OK.
aggregator /rc/rc\?.d/\?\+\+/etc/cwpsecureroot=Can't chroot to '%s'
policy_dir=file-only-profilefull-profileuse_profile=use_group=grant_log=reject_log=max_audit_log=%umax_learning_entry=%uUnknown option: '%s'
%02d-%02d-%02d.%02d:%02d:%02dCreating policy directory... exception_policy.confdomain_policy.confpolicy/current/profile.confpolicy/current/manager.confpolicypreviouscurrentOK
toolswexception_policy.tmpCreating exception policy... acl_group 0 file read%s
/sbin/ldconfigldconfig -NXp/bin/ldconfigacl_group 0 file read /lib\*.so\*
 => lib/ld-2.\*.sopath_group ANY_PATHNAME /path_group ANY_PATHNAME /\*path_group ANY_PATHNAME \*:/path_group ANY_DIRECTORY /path_group ANY_DIRECTORY \*://etc/init.d/%s/%skeep_domain  from <kernel> /sbin/init
domain_policy.tmpCreating domain policy... manager.tmpCreating manager policy... /usr/sbin%s/cwpsecure-loadpolicy
%s/cwpsecure-editpolicy
%s/cwpsecure-setlevel
%s/cwpsecure-setprofile
%s/cwpsecure-queryd
profile.tmpCreating default profile... ::filePROFILE_VERSION=20110903
stat.confstat.tmpCreating stat policy... editpolicy.confeditpolicy.tmpauditd.confauditd.tmppatternize.confpatternize.tmpnotifyd.confnotifyd.tmp/usr/lib/systemd/systemd/etc/boot.d/etc/rc.d/boot.d/etc/init.d/boot.d/etc/rc0.d/etc/rd1.d/etc/rc2.d/etc/rc3.d/etc/rc4.d/etc/rc5.d/etc/rc6.d/etc/rcS.d/etc/rc.d/rc0.d/etc/rc.d/rc1.d/etc/rc.d/rc2.d/etc/rc.d/rc3.d/etc/rc.d/rc4.d/etc/rc.d/rc5.d/etc/rc.d/rc6.d/sbin/cardmgr/sbin/getty/sbin/init/sbin/klogd/sbin/mingetty/sbin/portmap/sbin/rpc.statd/sbin/syslogd/sbin/udevd/usr/X11R6/bin/xfs/usr/bin/dbus-daemon/usr/bin/dbus-daemon-1/usr/bin/jserver/usr/bin/mDNSResponder/usr/bin/nifd/usr/bin/spamd/usr/sbin/acpid/usr/sbin/afpd/usr/sbin/anacron/usr/sbin/apache2/usr/sbin/apmd/usr/sbin/atalkd/usr/sbin/atd/usr/sbin/cannaserver/usr/sbin/cpuspeed/usr/sbin/cron/usr/sbin/crond/usr/sbin/cupsd/usr/sbin/dhcpd/usr/sbin/exim4/usr/sbin/gpm/usr/sbin/hald/usr/sbin/htt/usr/sbin/httpd/usr/sbin/inetd/usr/sbin/logrotate/usr/sbin/lpd/usr/sbin/nmbd/usr/sbin/papd/usr/sbin/rpc.idmapd/usr/sbin/rpc.mountd/usr/sbin/rpc.rquotad/usr/sbin/sendmail.sendmail/usr/sbin/smartd/usr/sbin/smbd/usr/sbin/squid/usr/sbin/sshd/usr/sbin/vmware-guestd/usr/sbin/vsftpd/usr/sbin/xinetd/proc/sys/kernel/modprobe/proc/sys/kernel/hotplug/lib/i686/nosegneg//usr/lib//usr/lib/i486//usr/lib/i586//usr/lib/i686//usr/lib/i686/cmov//usr/lib/tls//usr/lib/tls/i486//usr/lib/tls/i586//usr/lib/tls/i686//usr/lib/tls/i686/cmov//usr/lib/sse2//usr/X11R6/lib//usr/lib32//usr/lib64//lib64/tls//usr/lib/x86_64-linux-gnu//usr/lib/i386-linux-gnu//usr/lib/arm-linux-gnueabihf//usr/lib/arm-linux-gnueabi//usr/lib/aarch64-linux-gnu//usr/lib/ia64-linux-gnu//usr/lib/mips-linux-gnu//usr/lib/mipsel-linux-gnu//usr/lib/powerpc-linux-gnu//usr/lib/ppc64-linux-gnu//usr/lib/s390-linux-gnu//usr/lib/s390x-linux-gnu//usr/lib/sh4-linux-gnu//usr/lib/sparc-linux-gnu//usr/lib/sparc64-linux-gnu//usr/lib/x86_64-linux-gnux32//etc/ld.so.cache/proc/meminfo/proc/sys/kernel/version/etc/localtimeyesno�9@�9@:@:@!:@4:@?:@J:@U:@`:@k:@v:@�:@�:@�:@�:@�:@�:@�:@�:@�:@
;@;@!;@-;@<;@J;@Z;@h;@t;@�;@�;@�;@�;@�;@�;@�;@<@<@)<@;<@J<@[<@i<@<@�<@�<@�<@�<@�<@�<@�<@�<@=@=@,=@@=@N=@]=@l=@�=@�=@�=@�=@�=@�=@�=@>@>@0>@A>@[>@K?@�>@�>@�>@�>@�>@�>@�>@?@?@t>@�>@�>@�>@�>@�>@�>@�>@�>@?@?@2?@A?@Q?@]?@a?@i?@u?@y?@�?@�?@�?@�?@�?@�?@�?@�?@�?@@@@@@@1@@5@@L@@P@@h@@l@@�@@�@@�@@�@@�@@�@@�@@�@@�@@�@@A@A@!A@2A@@A@YA@ 4@H4@p4@�4@# This file contains configuration used by cwpsecure-notifyd command.

# cwpsecure-notifyd is a daemon that notifies the occurrence of policy violation
# in enforcing mode.
#
# time_to_wait is grace time in second before rejecting the request that
# caused policy violation in enforcing mode. For example, if you specify
# 30, you will be given 30 seconds for starting cwpsecure-queryd command and
# responding to the policy violation event.
# If you specify non 0 value, you need to register cwpsecure-notifyd command to
# /sys/kernel/security/cwpsecure/manager as well as cwpsecure-queryd command, for cwpsecure-notifyd needs to
# behave as if cwpsecure-queryd command is running.
# Also, you should avoid specifying too large value (e.g. 3600) because
# the request will remain pending for that period if you can't respond.
#
# action_to_take is a command line you want to use for notification.
# The command specified by this parameter must read the policy violation
# notification from standard input. For example, mail, curl and xmessage
# commands can read from standard input.
# This parameter is passed to execve(). Thus, please use a wrapper program
# if you need shell processing (e.g. wildcard expansion, environment
# variables).
#
# minimal_interval is grace time in second before re-notifying the next
# occurrence of policy violation. You can specify 60 to limit notification
# to once per a minute, 3600 to limit notification to once per an hour.
# You can specify 0 to unlimit, but notifying of every policy violation
# events (e.g. sending a mail) might annoy you because policy violation
# can occur in clusters if once occurred.

# Please use CWP SECURE Linux's escape rule (e.g. '\040' rather than '\ ' for
# representing a ' ' in a word).

# Examples:
#
# time_to_wait 180
# action_to_take mail admin@example.com
#
#    Wait for 180 seconds before rejecting the request.
#    The occurrence is notified by sending mail to admin@example.com
#    (if SMTP service is available).
#
# time_to_wait 0
# action_to_take curl --data-binary @- https://your.server/path_to_cgi
#
#    Reject the request immediately.
#    The occurrence is notified by executing curl command.
#
time_to_wait 0
action_to_take mail -s Notification\040from\040cwpsecure-notifyd root@localhost
minimal_interval 60

# This file contains rewriting rules used by cwpsecure-patternize command.

# Domain policy consists with domain declaration lines (which start with
# '<' ,) and acl declaration lines (which do not start with '<' ).
# You can refer the former using 'domain' keyword and the latter using 'acl'
# keyword.
#
# Words in each line are separated by a space character. Therefore, you can
# use 'domain[index]', 'acl[index]' for referring index'th word of the line.
# The index starts from 1, and 0 refers the whole line (i.e.
# 'domain[0]' = 'domain', 'acl[0]' = 'acl').
#
# Three operators are provided for conditional rewriting.
# '.contains' is for 'fgrep keyword' match.
# '.equals' is for 'grep ^keyword$' match.
# '.starts' is for 'grep ^keyword' match.
#
# Rewriting rules are defined using multi-lined chunks. A chunk is terminated
# by a 'rewrite' line which specifies old pattern and new pattern.
# A 'rewrite' line is evaluated only when all preceding 'domain' and 'acl'
# lines in that chunk have matched.
# Evaluation stops at first 'rewrite' line where a word matched old pattern.
# Therefore, no words are rewritten more than once.
#
# For user's convenience, new pattern can be omitted if old pattern is reused
# for new pattern.

# Please use CWP Secure Linux's escape rule (e.g. '\040' rather than '\ ' for
# representing a ' ' in a word).

# Files on proc filesystem.
rewrite path_pattern proc:/self/task/\$/fdinfo/\$
rewrite path_pattern proc:/self/task/\$/fd/\$
rewrite head_pattern proc:/self/task/\$/
rewrite path_pattern proc:/self/fdinfo/\$
rewrite path_pattern proc:/self/fd/\$
rewrite head_pattern proc:/self/
rewrite path_pattern proc:/\$/task/\$/fdinfo/\$
rewrite path_pattern proc:/\$/task/\$/fd/\$
rewrite head_pattern proc:/\$/task/\$/
rewrite path_pattern proc:/\$/fdinfo/\$
rewrite path_pattern proc:/\$/fd/\$
rewrite head_pattern proc:/\$/

# Files on devpts filesystem.
rewrite path_pattern devpts:/\$

# Files on pipe filesystem.
rewrite path_pattern pipe:[\$]
rewrite path_pattern pipefs:/[\$]

# Files on / partition.
rewrite tail_pattern /etc/mtab~\$
rewrite tail_pattern /etc/cwpsecure/policy/\*/domain_policy.conf
rewrite tail_pattern /etc/cwpsecure/policy/\*/exception_policy.conf
rewrite tail_pattern /etc/cwpsecure/policy/\*/manager.conf
rewrite tail_pattern /etc/cwpsecure/policy/\*/profile.conf
rewrite tail_pattern /etc/cwpsecure/policy/\*/

# Files on /tmp/ partition.
rewrite tail_pattern /vte\?\?\?\?\?\?
rewrite tail_pattern /.ICE-unix/\$
rewrite tail_pattern /keyring-\?\?\?\?\?\?/socket.ssh
rewrite tail_pattern /orbit-\*/bonobo-activation-register-\X.lock
rewrite tail_pattern /orbit-\*/bonobo-activation-server-\X-ior
rewrite tail_pattern /orbit-\*/linc-\*
rewrite tail_pattern /orbit-\*/
rewrite tail_pattern /sh-thd-\$
rewrite tail_pattern /zman\?\?\?\?\?\?

# Files on home directory.
rewrite tail_pattern /.ICEauthority-\?
rewrite tail_pattern /.xauth\?\?\?\?\?\?
rewrite tail_pattern /.xauth\?\?\?\?\?\?-?
rewrite tail_pattern /.local/share/applications/preferred-mail-reader.desktop.\?\?\?\?\?\?
rewrite tail_pattern /.local/share/applications/preferred-web-browser.desktop.\?\?\?\?\?\?

# Files on /var/ partition.
rewrite tail_pattern /cache/fontconfig/\X-le64.cache-3
rewrite tail_pattern /lib/gdm/.pulse/\X-default-source
rewrite tail_pattern /lib/gdm/.pulse/\X-default-sink
rewrite tail_pattern /lib/gdm/.dbus/session-bus/\X-\X
rewrite tail_pattern /run/gdm/auth-for-\*/database-\?
rewrite tail_pattern /run/gdm/auth-for-\*/database
rewrite tail_pattern /run/gdm/auth-for-\*/
rewrite tail_pattern /spool/abrt/pyhook-\*/\{\*\}/\*
rewrite tail_pattern /spool/abrt/pyhook-\*/\{\*\}/

# This file contains sorting rules used by cwpsecure-auditd command.

# An audit log consists with three lines. You can refer the first line
# using 'header' keyword, the second line using 'domain' keyword, and the
# third line using 'acl' keyword.
#
# Words in each line are separated by a space character. Therefore, you can
# use 'header[index]', 'domain[index]', 'acl[index]' for referring index'th
# word of the line. The index starts from 1, and 0 refers the whole line
# (i.e. 'header[0]' = 'header', 'domain[0]' = 'domain', 'acl[0]' = 'acl').
#
# Three operators are provided for conditional sorting.
# '.contains' is for 'fgrep keyword' match.
# '.equals' is for 'grep ^keyword$' match.
# '.starts' is for 'grep ^keyword' match.
#
# Sorting rules are defined using multi-lined chunks. A chunk is terminated
# by a 'destination' line which specifies the pathname to write the audit
# log. A 'destination' line is processed only when all preceding 'header',
# 'domain' and 'acl' lines in that chunk have matched.
# Evaluation stops at the first processed 'destination' line.
# Therefore, no audit logs are written more than once.
#
# More specific matches should be placed before less specific matches.
# For example:
#
# header.contains profile=3
# domain.contains /usr/sbin/httpd
# destination     /var/log/cwpsecure/reject_003_httpd.log
#
# This chunk should be placed before the chunk that matches logs with
# profile=3. If placed after, the audit logs for /usr/sbin/httpd will be
# sent to /var/log/cwpsecure/reject_003.log .

# Please use CWP Secure Linux's escape rule (e.g. '\040' rather than '\ ' for
# representing a ' ' in a word).

# Discard all granted logs.
header.contains granted=yes
destination     /dev/null

# Save rejected logs with profile=0 to /var/log/cwpsecure/reject_000.log
header.contains profile=0
destination     /var/log/cwpsecure/reject_000.log

# Save rejected logs with profile=1 to /var/log/cwpsecure/reject_001.log
header.contains profile=1
destination     /var/log/cwpsecure/reject_001.log

# Save rejected logs with profile=2 to /var/log/cwpsecure/reject_002.log
header.contains profile=2
destination     /var/log/cwpsecure/reject_002.log

# Save rejected logs with profile=3 to /var/log/cwpsecure/reject_003.log
header.contains profile=3
destination     /var/log/cwpsecure/reject_003.log

# This file contains configuration used by cwpsecure-editpolicy command.

# Keyword alias. ( directive-name = display-name )
keyword_alias acl_group   0                 = acl_group   0
keyword_alias acl_group   1                 = acl_group   1
keyword_alias acl_group   2                 = acl_group   2
keyword_alias acl_group   3                 = acl_group   3
keyword_alias acl_group   4                 = acl_group   4
keyword_alias acl_group   5                 = acl_group   5
keyword_alias acl_group   6                 = acl_group   6
keyword_alias acl_group   7                 = acl_group   7
keyword_alias acl_group   8                 = acl_group   8
keyword_alias acl_group   9                 = acl_group   9
keyword_alias acl_group  10                 = acl_group  10
keyword_alias acl_group  11                 = acl_group  11
keyword_alias acl_group  12                 = acl_group  12
keyword_alias acl_group  13                 = acl_group  13
keyword_alias acl_group  14                 = acl_group  14
keyword_alias acl_group  15                 = acl_group  15
keyword_alias acl_group  16                 = acl_group  16
keyword_alias acl_group  17                 = acl_group  17
keyword_alias acl_group  18                 = acl_group  18
keyword_alias acl_group  19                 = acl_group  19
keyword_alias acl_group  20                 = acl_group  20
keyword_alias acl_group  21                 = acl_group  21
keyword_alias acl_group  22                 = acl_group  22
keyword_alias acl_group  23                 = acl_group  23
keyword_alias acl_group  24                 = acl_group  24
keyword_alias acl_group  25                 = acl_group  25
keyword_alias acl_group  26                 = acl_group  26
keyword_alias acl_group  27                 = acl_group  27
keyword_alias acl_group  28                 = acl_group  28
keyword_alias acl_group  29                 = acl_group  29
keyword_alias acl_group  30                 = acl_group  30
keyword_alias acl_group  31                 = acl_group  31
keyword_alias acl_group  32                 = acl_group  32
keyword_alias acl_group  33                 = acl_group  33
keyword_alias acl_group  34                 = acl_group  34
keyword_alias acl_group  35                 = acl_group  35
keyword_alias acl_group  36                 = acl_group  36
keyword_alias acl_group  37                 = acl_group  37
keyword_alias acl_group  38                 = acl_group  38
keyword_alias acl_group  39                 = acl_group  39
keyword_alias acl_group  40                 = acl_group  40
keyword_alias acl_group  41                 = acl_group  41
keyword_alias acl_group  42                 = acl_group  42
keyword_alias acl_group  43                 = acl_group  43
keyword_alias acl_group  44                 = acl_group  44
keyword_alias acl_group  45                 = acl_group  45
keyword_alias acl_group  46                 = acl_group  46
keyword_alias acl_group  47                 = acl_group  47
keyword_alias acl_group  48                 = acl_group  48
keyword_alias acl_group  49                 = acl_group  49
keyword_alias acl_group  50                 = acl_group  50
keyword_alias acl_group  51                 = acl_group  51
keyword_alias acl_group  52                 = acl_group  52
keyword_alias acl_group  53                 = acl_group  53
keyword_alias acl_group  54                 = acl_group  54
keyword_alias acl_group  55                 = acl_group  55
keyword_alias acl_group  56                 = acl_group  56
keyword_alias acl_group  57                 = acl_group  57
keyword_alias acl_group  58                 = acl_group  58
keyword_alias acl_group  59                 = acl_group  59
keyword_alias acl_group  60                 = acl_group  60
keyword_alias acl_group  61                 = acl_group  61
keyword_alias acl_group  62                 = acl_group  62
keyword_alias acl_group  63                 = acl_group  63
keyword_alias acl_group  64                 = acl_group  64
keyword_alias acl_group  65                 = acl_group  65
keyword_alias acl_group  66                 = acl_group  66
keyword_alias acl_group  67                 = acl_group  67
keyword_alias acl_group  68                 = acl_group  68
keyword_alias acl_group  69                 = acl_group  69
keyword_alias acl_group  70                 = acl_group  70
keyword_alias acl_group  71                 = acl_group  71
keyword_alias acl_group  72                 = acl_group  72
keyword_alias acl_group  73                 = acl_group  73
keyword_alias acl_group  74                 = acl_group  74
keyword_alias acl_group  75                 = acl_group  75
keyword_alias acl_group  76                 = acl_group  76
keyword_alias acl_group  77                 = acl_group  77
keyword_alias acl_group  78                 = acl_group  78
keyword_alias acl_group  79                 = acl_group  79
keyword_alias acl_group  80                 = acl_group  80
keyword_alias acl_group  81                 = acl_group  81
keyword_alias acl_group  82                 = acl_group  82
keyword_alias acl_group  83                 = acl_group  83
keyword_alias acl_group  84                 = acl_group  84
keyword_alias acl_group  85                 = acl_group  85
keyword_alias acl_group  86                 = acl_group  86
keyword_alias acl_group  87                 = acl_group  87
keyword_alias acl_group  88                 = acl_group  88
keyword_alias acl_group  89                 = acl_group  89
keyword_alias acl_group  90                 = acl_group  90
keyword_alias acl_group  91                 = acl_group  91
keyword_alias acl_group  92                 = acl_group  92
keyword_alias acl_group  93                 = acl_group  93
keyword_alias acl_group  94                 = acl_group  94
keyword_alias acl_group  95                 = acl_group  95
keyword_alias acl_group  96                 = acl_group  96
keyword_alias acl_group  97                 = acl_group  97
keyword_alias acl_group  98                 = acl_group  98
keyword_alias acl_group  99                 = acl_group  99
keyword_alias acl_group 100                 = acl_group 100
keyword_alias acl_group 101                 = acl_group 101
keyword_alias acl_group 102                 = acl_group 102
keyword_alias acl_group 103                 = acl_group 103
keyword_alias acl_group 104                 = acl_group 104
keyword_alias acl_group 105                 = acl_group 105
keyword_alias acl_group 106                 = acl_group 106
keyword_alias acl_group 107                 = acl_group 107
keyword_alias acl_group 108                 = acl_group 108
keyword_alias acl_group 109                 = acl_group 109
keyword_alias acl_group 110                 = acl_group 110
keyword_alias acl_group 111                 = acl_group 111
keyword_alias acl_group 112                 = acl_group 112
keyword_alias acl_group 113                 = acl_group 113
keyword_alias acl_group 114                 = acl_group 114
keyword_alias acl_group 115                 = acl_group 115
keyword_alias acl_group 116                 = acl_group 116
keyword_alias acl_group 117                 = acl_group 117
keyword_alias acl_group 118                 = acl_group 118
keyword_alias acl_group 119                 = acl_group 119
keyword_alias acl_group 120                 = acl_group 120
keyword_alias acl_group 121                 = acl_group 121
keyword_alias acl_group 122                 = acl_group 122
keyword_alias acl_group 123                 = acl_group 123
keyword_alias acl_group 124                 = acl_group 124
keyword_alias acl_group 125                 = acl_group 125
keyword_alias acl_group 126                 = acl_group 126
keyword_alias acl_group 127                 = acl_group 127
keyword_alias acl_group 128                 = acl_group 128
keyword_alias acl_group 129                 = acl_group 129
keyword_alias acl_group 130                 = acl_group 130
keyword_alias acl_group 131                 = acl_group 131
keyword_alias acl_group 132                 = acl_group 132
keyword_alias acl_group 133                 = acl_group 133
keyword_alias acl_group 134                 = acl_group 134
keyword_alias acl_group 135                 = acl_group 135
keyword_alias acl_group 136                 = acl_group 136
keyword_alias acl_group 137                 = acl_group 137
keyword_alias acl_group 138                 = acl_group 138
keyword_alias acl_group 139                 = acl_group 139
keyword_alias acl_group 140                 = acl_group 140
keyword_alias acl_group 141                 = acl_group 141
keyword_alias acl_group 142                 = acl_group 142
keyword_alias acl_group 143                 = acl_group 143
keyword_alias acl_group 144                 = acl_group 144
keyword_alias acl_group 145                 = acl_group 145
keyword_alias acl_group 146                 = acl_group 146
keyword_alias acl_group 147                 = acl_group 147
keyword_alias acl_group 148                 = acl_group 148
keyword_alias acl_group 149                 = acl_group 149
keyword_alias acl_group 150                 = acl_group 150
keyword_alias acl_group 151                 = acl_group 151
keyword_alias acl_group 152                 = acl_group 152
keyword_alias acl_group 153                 = acl_group 153
keyword_alias acl_group 154                 = acl_group 154
keyword_alias acl_group 155                 = acl_group 155
keyword_alias acl_group 156                 = acl_group 156
keyword_alias acl_group 157                 = acl_group 157
keyword_alias acl_group 158                 = acl_group 158
keyword_alias acl_group 159                 = acl_group 159
keyword_alias acl_group 160                 = acl_group 160
keyword_alias acl_group 161                 = acl_group 161
keyword_alias acl_group 162                 = acl_group 162
keyword_alias acl_group 163                 = acl_group 163
keyword_alias acl_group 164                 = acl_group 164
keyword_alias acl_group 165                 = acl_group 165
keyword_alias acl_group 166                 = acl_group 166
keyword_alias acl_group 167                 = acl_group 167
keyword_alias acl_group 168                 = acl_group 168
keyword_alias acl_group 169                 = acl_group 169
keyword_alias acl_group 170                 = acl_group 170
keyword_alias acl_group 171                 = acl_group 171
keyword_alias acl_group 172                 = acl_group 172
keyword_alias acl_group 173                 = acl_group 173
keyword_alias acl_group 174                 = acl_group 174
keyword_alias acl_group 175                 = acl_group 175
keyword_alias acl_group 176                 = acl_group 176
keyword_alias acl_group 177                 = acl_group 177
keyword_alias acl_group 178                 = acl_group 178
keyword_alias acl_group 179                 = acl_group 179
keyword_alias acl_group 180                 = acl_group 180
keyword_alias acl_group 181                 = acl_group 181
keyword_alias acl_group 182                 = acl_group 182
keyword_alias acl_group 183                 = acl_group 183
keyword_alias acl_group 184                 = acl_group 184
keyword_alias acl_group 185                 = acl_group 185
keyword_alias acl_group 186                 = acl_group 186
keyword_alias acl_group 187                 = acl_group 187
keyword_alias acl_group 188                 = acl_group 188
keyword_alias acl_group 189                 = acl_group 189
keyword_alias acl_group 190                 = acl_group 190
keyword_alias acl_group 191                 = acl_group 191
keyword_alias acl_group 192                 = acl_group 192
keyword_alias acl_group 193                 = acl_group 193
keyword_alias acl_group 194                 = acl_group 194
keyword_alias acl_group 195                 = acl_group 195
keyword_alias acl_group 196                 = acl_group 196
keyword_alias acl_group 197                 = acl_group 197
keyword_alias acl_group 198                 = acl_group 198
keyword_alias acl_group 199                 = acl_group 199
keyword_alias acl_group 200                 = acl_group 200
keyword_alias acl_group 201                 = acl_group 201
keyword_alias acl_group 202                 = acl_group 202
keyword_alias acl_group 203                 = acl_group 203
keyword_alias acl_group 204                 = acl_group 204
keyword_alias acl_group 205                 = acl_group 205
keyword_alias acl_group 206                 = acl_group 206
keyword_alias acl_group 207                 = acl_group 207
keyword_alias acl_group 208                 = acl_group 208
keyword_alias acl_group 209                 = acl_group 209
keyword_alias acl_group 210                 = acl_group 210
keyword_alias acl_group 211                 = acl_group 211
keyword_alias acl_group 212                 = acl_group 212
keyword_alias acl_group 213                 = acl_group 213
keyword_alias acl_group 214                 = acl_group 214
keyword_alias acl_group 215                 = acl_group 215
keyword_alias acl_group 216                 = acl_group 216
keyword_alias acl_group 217                 = acl_group 217
keyword_alias acl_group 218                 = acl_group 218
keyword_alias acl_group 219                 = acl_group 219
keyword_alias acl_group 220                 = acl_group 220
keyword_alias acl_group 221                 = acl_group 221
keyword_alias acl_group 222                 = acl_group 222
keyword_alias acl_group 223                 = acl_group 223
keyword_alias acl_group 224                 = acl_group 224
keyword_alias acl_group 225                 = acl_group 225
keyword_alias acl_group 226                 = acl_group 226
keyword_alias acl_group 227                 = acl_group 227
keyword_alias acl_group 228                 = acl_group 228
keyword_alias acl_group 229                 = acl_group 229
keyword_alias acl_group 230                 = acl_group 230
keyword_alias acl_group 231                 = acl_group 231
keyword_alias acl_group 232                 = acl_group 232
keyword_alias acl_group 233                 = acl_group 233
keyword_alias acl_group 234                 = acl_group 234
keyword_alias acl_group 235                 = acl_group 235
keyword_alias acl_group 236                 = acl_group 236
keyword_alias acl_group 237                 = acl_group 237
keyword_alias acl_group 238                 = acl_group 238
keyword_alias acl_group 239                 = acl_group 239
keyword_alias acl_group 240                 = acl_group 240
keyword_alias acl_group 241                 = acl_group 241
keyword_alias acl_group 242                 = acl_group 242
keyword_alias acl_group 243                 = acl_group 243
keyword_alias acl_group 244                 = acl_group 244
keyword_alias acl_group 245                 = acl_group 245
keyword_alias acl_group 246                 = acl_group 246
keyword_alias acl_group 247                 = acl_group 247
keyword_alias acl_group 248                 = acl_group 248
keyword_alias acl_group 249                 = acl_group 249
keyword_alias acl_group 250                 = acl_group 250
keyword_alias acl_group 251                 = acl_group 251
keyword_alias acl_group 252                 = acl_group 252
keyword_alias acl_group 253                 = acl_group 253
keyword_alias acl_group 254                 = acl_group 254
keyword_alias acl_group 255                 = acl_group 255
keyword_alias address_group                 = address_group
keyword_alias aggregator                    = aggregator
keyword_alias file append                   = file append
keyword_alias file chgrp                    = file chgrp
keyword_alias file chmod                    = file chmod
keyword_alias file chown                    = file chown
keyword_alias file chroot                   = file chroot
keyword_alias file create                   = file create
keyword_alias file execute                  = file execute
keyword_alias file getattr                  = file getattr
keyword_alias file ioctl                    = file ioctl
keyword_alias file link                     = file link
keyword_alias file mkblock                  = file mkblock
keyword_alias file mkchar                   = file mkchar
keyword_alias file mkdir                    = file mkdir
keyword_alias file mkfifo                   = file mkfifo
keyword_alias file mksock                   = file mksock
keyword_alias file mount                    = file mount
keyword_alias file pivot_root               = file pivot_root
keyword_alias file read                     = file read
keyword_alias file rename                   = file rename
keyword_alias file rmdir                    = file rmdir
keyword_alias file symlink                  = file symlink
keyword_alias file truncate                 = file truncate
keyword_alias file unlink                   = file unlink
keyword_alias file unmount                  = file unmount
keyword_alias file write                    = file write
keyword_alias initialize_domain             = initialize_domain
keyword_alias keep_domain                   = keep_domain
keyword_alias misc env                      = misc env
keyword_alias network inet                  = network inet
keyword_alias network unix                  = network unix
keyword_alias no_initialize_domain          = no_initialize_domain
keyword_alias no_keep_domain                = no_keep_domain
keyword_alias no_reset_domain               = no_reset_domain
keyword_alias number_group                  = number_group
keyword_alias path_group                    = path_group
keyword_alias quota_exceeded                = quota_exceeded
keyword_alias reset_domain                  = reset_domain
keyword_alias task manual_domain_transition = task manual_domain_transition
keyword_alias transition_failed             = transition_failed
keyword_alias use_group                     = use_group
keyword_alias use_profile                   = use_profile

# Line color. 0 = BLACK, 1 = RED, 2 = GREEN, 3 = YELLOW, 4 = BLUE, 5 = MAGENTA, 6 = CYAN, 7 = WHITE
line_color ACL_CURSOR       = 03
line_color ACL_HEAD         = 03
line_color DOMAIN_CURSOR    = 02
line_color DOMAIN_HEAD      = 02
line_color EXCEPTION_CURSOR = 06
line_color EXCEPTION_HEAD   = 06
line_color MANAGER_CURSOR   = 72
line_color MANAGER_HEAD     = 72
line_color STAT_CURSOR      = 03
line_color STAT_HEAD        = 03
line_color PROFILE_CURSOR   = 71
line_color PROFILE_HEAD     = 71
line_color DEFAULT_COLOR    = 70
;�@]����_����s����t���u��Pu��(�u��Hw��p�w��� x����x���x��@y��8|����|�� zRx�.s��*zRx�$h\��`FJw�?;*3$"D�s��2\�s��Bt t��CA�z
AF$�Pt��cH��
V�4��u���B�A�A �L� o
 AABA�@v��%D`<Xv���B�E�D �C(�G0{
(A ABBEL�v��*Ded�v��ZG�RL�w���B�N�B �B(�A0�A8�D`
8A0A(B BBBHL� ]��&B�B�B �B(�A0�A8�D��
8C0A(B BBBCD$0y��eB�E�E �E(�H0�H8�M@l8A0A(B BBBlXy���#@p#@ @
�+@�`�`���o�@�@�@
f�`x�@x@0	���o8@���o�o�@(�`V@f@v@�@�@�@�@�@�@�@�@
@
@&
@6
@F
@V
@f
@v
@�
@�
@�
@�
@�
@�
@�
@�
@@@&@6@F@V@f@v@�@�@�5@hA@lA@init_policy.debug����7zXZ�ִF!t/����]?�E�h=��ڊ̓�N����\�$���{#�liUfkw��V��I�
�94�=�V�1&����l���nn��%*�5��j���=ǫ��B�₱�dw��
�D��9o
���+��b��?� ��}9
6�O
Ʌ�� f���s�BمH3�K��*FV��<ѯW�M�Oovȩ��1hg�6��]�E����A^�)������
c����.	y�/̝��~>�:!����Z\�^%�������+r�-��Z�<U�?^�9?CP{Mڮq�˄g���2N���}7��ٍ��1�չS�㆝I�W�k������H��Y�Л`��b���/i?��)�����Y���aO���~f������	Y���~�K��_�H4�Ϣ22Tu�m�ZT���G��=�_�	_^AVt}J"J1 ���� �0��UB����f��1���[,Pt��P��I��Ɋ�0"��G�%���*T�HjUǻ6��^�^����}�v�Y���8jBIn�F��d(�vi��r^����5��J��K�l�~����Vl�N���+4:�1��G��qH����0�Z��-En`��V��J.�~���>���(�x�4�I��/\�["�_��?��O�:8��1B��PO���Bh}�T�JƑ��9%�j��R��J4���߿�!_��堏�,�dž�hu���}>No�Ѷl��U
�ИG��]l�ӸT�t
��1!�qd�,5&����tD"�%~H����Ųd҉�[�����/�sك���¤���%؝|�5C)�j���=;!��I��v%HD���s�ú��d�1��u���b3�qhk����9����'�l8�D72���0��x0���l�^R!rs�����L>	�x79�zz�ݎ�k��u	@������g�A��s���^�o)%�V�Np��X^�6�r冀cSN���Y �o��յ�Ur���7����c�
&pS,$��!W�Qڱ�g�YZ.shstrtab.interp.note.ABI-tag.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.jcr.dynamic.got.plt.data.bss.gnu_debuglink.gnu_debugdata8@8T@T !t@t$4���o�@�$>�@��F�@�fN���o�@�P[���o8@8@jx@x0tB�@�x~ @ y@@@`��@���@����+@�+	��+@�+]� ��@�����@�����`���`�� �` ��(�`(�����`����`�@�@�`@�(���`h�P  �h���(��