HEX
Server: Apache
System: Linux dinesh8189 5.15.98-grsec-sharedvalley-2.lc.el8.x86_64 #1 SMP Thu Mar 9 09:07:30 -03 2023 x86_64
User: cgmgerenciamento1 (814285)
PHP: 8.1.26
Disabled: apache_child_terminate,dl,escapeshellarg,escapeshellcmd,exec,link,mail,openlog,passthru,pcntl_alarm,pcntl_exec,pcntl_fork,pcntl_get_last_error,pcntl_getpriority,pcntl_setpriority,pcntl_signal,pcntl_signal_dispatch,pcntl_sigprocmask,pcntl_sigtimedwait,pcntl_sigwaitinfo,pcntl_strerror,pcntl_wait,pcntl_waitpid,pcntl_wexitstatus,pcntl_wifexited,pcntl_wifsignaled,pcntl_wifstopped,pcntl_wstopsig,pcntl_wtermsig,php_check_syntax,php_strip_whitespace,popen,proc_close,proc_open,shell_exec,symlink,system
Upload Files
File: //usr/share/setroubleshoot/plugins/__pycache__/catchall.cpython-36.opt-1.pyc
3

m��a��@s<ddlZejddd�ZejZddlmZGdd�de�ZdS)�Nzsetroubleshoot-pluginsT)Zfallback)�Pluginc@sLeZdZed�Zed�Zed�Zdd�Zed�Zed�Z	dd	�Z
d
d�ZdS)
�pluginz4SELinux is preventing $SOURCE_PATH "$ACCESS" access.a1

    SELinux denied access requested by $SOURCE. It is not
    expected that this access is required by $SOURCE and this access
    may signal an intrusion attempt. It is also possible that the specific
    version or configuration of the application is causing it to require
    additional access.

    z�
    You can generate a local policy module to allow this
    access - see <a href="http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385">FAQ</a>

    Please file a bug report.
    cCsP|ddkrtd�S|ddkr(td�St|�dkrH|d	dkrHtd�Std
�S)N��process�process2ztIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on processes labeled $TARGET_TYPE by default.�
capability�capability2zTIf you believe that $SOURCE_BASE_PATH should have the $ACCESS capability by default.���(null)�UnknownzxIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on $TARGET_CLASS labeled $TARGET_TYPE by default.zyIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on the $TARGET_BASE_PATH $TARGET_CLASS by default.)rr)rr)rr)�_�len)�self�avc�args�r�-/usr/share/setroubleshoot/plugins/catchall.py�get_if_text0szplugin.get_if_textz]You should report this as a bug.
You can generate a local policy module to allow this access.z�Allow this access for now by executing:
# ausearch -c '$SOURCE' --raw | audit2allow -M my-$MODULE_NAME
# semodule -X 300 -i my-$MODULE_NAME.ppcCs tj|t�|jd�d|_dS)NrT)r�__init__�__name__Zset_priorityZ
report_bug)rrrrr>s
zplugin.__init__cCs:|jr|jd|jd}n
|jd}|jd|j|jf�S)Nz on �.r)Ztpath�summaryZreportZtclass)rrrrrr�analyzeCs
zplugin.analyzeN)r�
__module__�__qualname__r
rZproblem_descriptionZfix_descriptionrZ	then_textZdo_textrrrrrrrs	r)�gettextZtranslationr
Zsetroubleshoot.Pluginrrrrrr�<module>s