dbfdg 3 nma @s\ddlZejdddZejZddlTddlmZedZedZed ZGd d d eZ dS) Nzsetroubleshoot-pluginsT)Zfallback)*)Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hackedz:Contact your security administrator and report this issue.c@sLeZdZedZedZdZdZedZedZ edZ ddZ d d Z d S) pluginze Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement. a SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux. Files under /sys/fs/selinux control the way SELinux is configured. All programs that need to write to files under /sys/fs/selinux should have already had policy written for them. If a compromised application tries to turn off SELinux this AVC will be generated. This is a serious issue. Your system may very well be compromised. z:Contact your security administrator and report this issue.z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.cCstj|td|_dS)NZred)r__init____name__level)selfr //usr/share/setroubleshoot/plugins/setenforce.pyr4s zplugin.__init__cCs$|jdgr |jdgr |jSdS)NwriteZ security_t)Zhas_any_access_inZmatches_target_typesZreport)r Zavcr r r analyze8s  zplugin.analyzeN) r __module__ __qualname___ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdif_text then_textdo_textrr r r r r rsr) gettextZ translationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrrrrr r r r s