a Z` @s\ddlZejdddZejZddlTddlmZedZedZed ZGd d d eZ dS) Nzsetroubleshoot-pluginsT)Zfallback)*)Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hacked:Contact your security administrator and report this issue.c@sLeZdZedZedZdZdZedZedZ edZ ddZ d d Z d S) pluginze Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement. a SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux. Files under /sys/fs/selinux control the way SELinux is configured. All programs that need to write to files under /sys/fs/selinux should have already had policy written for them. If a compromised application tries to turn off SELinux this AVC will be generated. This is a serious issue. Your system may very well be compromised. rz5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.cCst|td|_dS)NZred)r__init____name__level)selfr //usr/share/setroubleshoot/plugins/setenforce.pyr4s zplugin.__init__cCs$|dgr |dgr |SdS)NwriteZ security_t)Zhas_any_access_inZmatches_target_typesZreport)r Zavcr r r analyze8s   zplugin.analyzeN) r __module__ __qualname___ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdif_text then_textdo_textrrr r r r rs r) gettextZ translationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrrrrr r r r s