File: //usr/share/setroubleshoot/plugins/__pycache__/allow_execmem.cpython-36.opt-1.pyc
3
nm�aH � @ sT d dl Z d dlT d dlZejddd�ZejZd dlT d dlmZ G dd� de�ZdS ) � N)�*zsetroubleshoot-pluginsT)Zfallback)�Pluginc @ sd e Zd Zed�Zed�ZdZdZdZdZ dZ
dZd d
� Zdd� Z
d
d� Zdd� Zdd� Zdd� ZdS )�pluginzX
SELinux is preventing $SOURCE_PATH from creating an executable memory mapping.
a�
The $SOURCE application attempted to create an anonymous executable memory mapping,
or a writable executable file mapping. This is a potential security problem. Most
applications do not need this permission. The
<a href="http://people.redhat.com/drepper/selinux-mem.html">SELinux Memory Protection Tests</a>
web page explains why SELinux intervened and how to work around it if needed.
z6If this issue occurred during normal system operation.zIThis alert could be a serious issue and your system could be compromised.z9Contact your security administrator and report this issuez�If you know why $SOURCE needs to map a memory region that is both executable and writable and understand that this is a potential security problem.zFYou can allow the mapping by switching one of the following booleans: zuFollow the advice of the catchall_boolean plugin, otherwise contact your security administrator and report this issuec C s | j S )N)�problem_description)�self�avc�args� r �2/usr/share/setroubleshoot/plugins/allow_execmem.py�get_problem_description5 s zplugin.get_problem_descriptionc C s t |�dkr| jS | jS )Nr )�len�if_text�unsafe_if_text)r r r r r r
�get_if_text8 s zplugin.get_if_textc C s"