File: //usr/share/setroubleshoot/plugins/__pycache__/dac_override.cpython-36.pyc
3
nm�ak � @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sL e Zd Zed�Zed�ZdZdZed�Zed�Z ed�Z
dd� Zd d
� ZdS )�pluginzF
SELinux is preventing $SOURCE_PATH the "$ACCESS" capability.
z�
dac_override and dac_read_search capabilities usually indicates that the root process does not have access to a file based on the permission flags. This usually mean you have some file with the wrong ownership/permissions on it.
� zuIf you want to help identify if domain needs this access or you have a file with the wrong permissions on your systemzdturn on full auditing to get path information about the offending file and generate the error again.z�
Turn on full auditing
# auditctl -w /etc/shadow -p w
Try to recreate AVC. Then execute
# ausearch -m avc -ts recent
If you see PATH record check ownership/permissions on file, and fix it,
otherwise report as a bugzilla.c C s t j| t� d| _d S )NZgreen)r �__init__�__name__�level)�self� r
�1/usr/share/setroubleshoot/plugins/dac_override.pyr 0 s zplugin.__init__c C s |j ddg�r| j� S d S )NZdac_overrideZdac_read_search)Zhas_any_access_inZreport)r Zavcr
r
r �analyze4 s zplugin.analyzeN)
r �
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r
r
r
r r s r )�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r
r
r
r �<module> s