HEX
Server: Apache
System: Linux 185.122.168.184.host.secureserver.net 5.14.0-570.60.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Nov 5 05:00:59 EST 2025 x86_64
User: barbeatleanalyti (1024)
PHP: 8.1.33
Disabled: NONE
Upload Files
File: //usr/share/setroubleshoot/plugins/__pycache__/sys_module.cpython-39.opt-1.pyc
a

�Z`d	�@s\ddlZejddd�ZejZddlTddlmZed�Zed�Zed	�ZGd
d�de�Z	dS)�Nzsetroubleshoot-pluginsT)Zfallback)�*)�PluginzaIf you do not believe your $SOURCE_PATH should be modifying the kernel, by loading kernel moduleszYou might have been hacked.�:Contact your security administrator and report this issue.c@sLeZdZed�Zed�ZdZed�Zed�Zed�Z	dZ
dd�Zd	d
�ZdS)�pluginz_
    Your system may be seriously compromised! $SOURCE_PATH tried to load a kernel module.
    aT
    SELinux has prevented $SOURCE from loading a kernel module.
    All confined programs that need to load kernel modules should have already had policy
    written for them. If a compromised application
    tries to modify the kernel this AVC will be generated. This is a serious
    issue. Your system may very well be compromised.
    rzmIf you do not believe that $SOURCE_PATH should be attempting to modify the kernel by loading a kernel module.z7A process might be attempting to hack into your system.�cCs t�|t�|�d�d|_dS)N�dZred)r�__init__�__name__Zset_priority�level)�self�r�//usr/share/setroubleshoot/plugins/sys_module.pyr2s
zplugin.__init__cCs|�dg�r|��SdS)N�
sys_module)Zhas_any_access_inZreport)rZavcrrr
�analyze7szplugin.analyzeN)
r	�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_description�if_text�	then_text�do_textZfix_cmdrrrrrr
r sr)
�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrrrrrrrr
�<module>s