File: //usr/share/setroubleshoot/plugins/__pycache__/vbetool.cpython-36.opt-1.pyc
3
nm�a
� @ sT d dl Z e jddd�Zej Zd dlT d dlmZ d dlZd dlZG dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sL e Zd Zed�Zed�Zed�ZdZed�Zed�Z dZ
dd � Zd
d� ZdS )
�pluginzS
SELinux has prevented vbetool from performing an unsafe memory operation.
a�
SELinux denied an operation requested by $SOURCE, a program used
to alter video hardware state. This program is known to use
an unsafe operation on system memory but so are a number of
malware/exploit programs which masquerade as vbetool. This tool is used to
reset video state when a machine resumes from a suspend. If your machine
is not resuming properly your only choice is to allow this
operation and reduce your system security against such malware.
z�
If you decide to continue to run the program in question you will need
to allow this operation. This can be done on the command line by
executing:
# setsebool -P mmap_low_allowed 1
z)/usr/sbin/setsebool -P mmap_low_allowed 1zfIf you want to ignore this AVC because it is dangerous and your machine seems to be working correctly.zRyou must tell SELinux about this by enabling the vbetool_mmap_zero_ignore boolean.z)# setsebool -P vbetool_mmap_zero_ignore 1c C s t j| t� d| _td�| _d S )NTzTurn off memory protection)r �__init__�__name__Zfixable�_Zbutton_text)�self� r �,/usr/share/setroubleshoot/plugins/vbetool.pyr ; s zplugin.__init__c C s6 |j dg�r2|jdg�r2tj|j�jdkr2| j� S d S )NZ mmap_zeroZ vbetool_tr )Zhas_any_access_inZmatches_source_types�os�statZspath�st_uidZreport)r Zavcr r r
�analyze@ s
zplugin.analyzeN)
r �
__module__�__qualname__r ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r r r r
r s r ) �gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr �rer r r r r r
�<module> s