관리-도구
편집 파일: sys_module.cpython-39.opt-1.pyc
a �Z`d � @ s\ d dl Z e jddd�Zej Zd dlT d dlmZ ed�Zed�Zed �ZG d d� de�Z dS )� Nzsetroubleshoot-pluginsT)Zfallback)�*)�PluginzaIf you do not believe your $SOURCE_PATH should be modifying the kernel, by loading kernel moduleszYou might have been hacked.�:Contact your security administrator and report this issue.c @ sL e Zd Zed�Zed�ZdZed�Zed�Zed�Z dZ dd� Zd d � ZdS )�pluginz_ Your system may be seriously compromised! $SOURCE_PATH tried to load a kernel module. aT SELinux has prevented $SOURCE from loading a kernel module. All confined programs that need to load kernel modules should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. r zmIf you do not believe that $SOURCE_PATH should be attempting to modify the kernel by loading a kernel module.z7A process might be attempting to hack into your system.� c C s t �| t� | �d� d| _d S )N�d Zred)r �__init__�__name__Zset_priority�level)�self� r �//usr/share/setroubleshoot/plugins/sys_module.pyr 2 s zplugin.__init__c C s |� dg�r| �� S d S )N� sys_module)Zhas_any_access_inZreport)r Zavcr r r �analyze7 s zplugin.analyzeN) r � __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_description�if_text� then_text�do_textZfix_cmdr r r r r r r s r ) �gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r r r r �<module> s