관리-도구
편집 파일: setenforce.cpython-39.pyc
a �����Z`� ����������������������@���s\���d�dl�Z�e�jddd�Zej�Zd�dlT�d�dlmZ�ed�Zed�Zed �ZG�d d��de�Z dS�)�����Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hacked�:Contact your security administrator and report this issue.c�������������������@���sL���e�Zd�Zed�Zed�ZdZdZed�Zed�Z ed�Z dd��Zd d ��ZdS�)�pluginze Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement. a��� SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux. Files under /sys/fs/selinux control the way SELinux is configured. All programs that need to write to files under /sys/fs/selinux should have already had policy written for them. If a compromised application tries to turn off SELinux this AVC will be generated. This is a serious issue. Your system may very well be compromised. r�����z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.c�����������������C���s���t��|�t��d|�_d�S�)NZred)r����__init__�__name__�level)�self��r����//usr/share/setroubleshoot/plugins/setenforce.pyr���4���s����zplugin.__init__c�����������������C���s$���|��dg�r |�dg�r |����S�d�S�)N�writeZ security_t)Zhas_any_access_inZmatches_target_typesZreport)r ���Zavcr���r���r����analyze8���s ���� �zplugin.analyzeN) r���� __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmd�if_text� then_text�do_textr���r���r���r���r���r���r������s��� r���) �gettextZtranslationr���Zsetroubleshoot.utilZsetroubleshoot.Pluginr���r���r���r���r���r���r���r���r����<module>���s���