1abrt_handle_event_selinuSxE(L8i)nux Policy abrt_handle_eavberntt_handle_event_selinux(8)
2
3
4
6 abrt_handle_event_selinux - Security Enhanced Linux Policy for the
7 abrt_handle_event processes
8
10 Security-Enhanced Linux secures the abrt_handle_event processes via
11 flexible mandatory access control.
12
13 The abrt_handle_event processes execute with the abrt_handle_event_t
14 SELinux type. You can check if you have these processes running by exe‐
15 cuting the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep abrt_handle_event_t
20
21
22
24 The abrt_handle_event_t SELinux type can be entered via the file_type,
25 abrt_handle_event_exec_t, unlabeled_t, proc_type, filesystem_type,
26 mtrr_device_t, sysctl_type file types.
27
28 The default entrypoint paths for the abrt_handle_event_t domain are the
29 following:
30
31 all files on the system, /usr/libexec/abrt-handle-event, /dev/cpu/mtrr
32
34 SELinux defines process types (domains) for each process running on the
35 system
36
37 You can see the context of a process using the -Z option to ps
38
39 Policy governs the access confined processes have to files. SELinux
40 abrt_handle_event policy is very flexible allowing users to setup their
41 abrt_handle_event processes in as secure a method as possible.
42
43 The following process types are defined for abrt_handle_event:
44
45 abrt_handle_event_t
46
47 Note: semanage permissive -a abrt_handle_event_t can be used to make
48 the process type abrt_handle_event_t permissive. SELinux does not deny
49 access to permissive process types, but the AVC (SELinux denials) mes‐
50 sages are still generated.
51
52
54 SELinux policy is customizable based on least access required.
55 abrt_handle_event policy is extremely flexible and has several booleans
56 that allow you to manipulate the policy and run abrt_handle_event with
57 the tightest access possible.
58
59
60
61 If you want to allow ABRT to run in abrt_handle_event_t domain to han‐
62 dle ABRT event scripts, you must turn on the abrt_handle_event boolean.
63 Disabled by default.
64
65 setsebool -P abrt_handle_event 1
66
67
68
69 If you want to allow all domains to use other domains file descriptors,
70 you must turn on the allow_domain_fd_use boolean. Enabled by default.
71
72 setsebool -P allow_domain_fd_use 1
73
74
75
76 If you want to allow unconfined executables to make their heap memory
77 executable. Doing this is a really bad idea. Probably indicates a
78 badly coded executable, but could indicate an attack. This executable
79 should be reported in bugzilla, you must turn on the allow_execheap
80 boolean. Disabled by default.
81
82 setsebool -P allow_execheap 1
83
84
85
86 If you want to allow unconfined executables to map a memory region as
87 both executable and writable, this is dangerous and the executable
88 should be reported in bugzilla), you must turn on the allow_execmem
89 boolean. Enabled by default.
90
91 setsebool -P allow_execmem 1
92
93
94
95 If you want to allow all unconfined executables to use libraries
96 requiring text relocation that are not labeled textrel_shlib_t), you
97 must turn on the allow_execmod boolean. Enabled by default.
98
99 setsebool -P allow_execmod 1
100
101
102
103 If you want to allow unconfined executables to make their stack exe‐
104 cutable. This should never, ever be necessary. Probably indicates a
105 badly coded executable, but could indicate an attack. This executable
106 should be reported in bugzilla), you must turn on the allow_execstack
107 boolean. Enabled by default.
108
109 setsebool -P allow_execstack 1
110
111
112
113 If you want to allow sysadm to debug or ptrace all processes, you must
114 turn on the allow_ptrace boolean. Disabled by default.
115
116 setsebool -P allow_ptrace 1
117
118
119
120 If you want to allow all domains to have the kernel load modules, you
121 must turn on the domain_kernel_load_modules boolean. Disabled by
122 default.
123
124 setsebool -P domain_kernel_load_modules 1
125
126
127
128 If you want to allow all domains to execute in fips_mode, you must turn
129 on the fips_mode boolean. Enabled by default.
130
131 setsebool -P fips_mode 1
132
133
134
135 If you want to enable reading of urandom for all domains, you must turn
136 on the global_ssp boolean. Disabled by default.
137
138 setsebool -P global_ssp 1
139
140
141
142 If you want to allow certain domains to map low memory in the kernel,
143 you must turn on the mmap_low_allowed boolean. Disabled by default.
144
145 setsebool -P mmap_low_allowed 1
146
147
148
149 If you want to boolean to determine whether the system permits loading
150 policy, setting enforcing mode, and changing boolean values. Set this
151 to true and you have to reboot to set it back, you must turn on the
152 secure_mode_policyload boolean. Disabled by default.
153
154 setsebool -P secure_mode_policyload 1
155
156
157
158 If you want to support X userspace object manager, you must turn on the
159 xserver_object_manager boolean. Disabled by default.
160
161 setsebool -P xserver_object_manager 1
162
163
164
166 The SELinux process type abrt_handle_event_t can manage files labeled
167 with the following file types. The paths listed are the default paths
168 for these file types. Note the processes UID still need to have DAC
169 permissions.
170
171 file_type
172
173 all files on the system
174
175
177 SELinux requires files to have an extended attribute to define the file
178 type.
179
180 You can see the context of a file using the -Z option to ls
181
182 Policy governs the access confined processes have to these files.
183 SELinux abrt_handle_event policy is very flexible allowing users to
184 setup their abrt_handle_event processes in as secure a method as possi‐
185 ble.
186
187 The following file types are defined for abrt_handle_event:
188
189
190
191 abrt_handle_event_exec_t
192
193 - Set files with the abrt_handle_event_exec_t type, if you want to
194 transition an executable to the abrt_handle_event_t domain.
195
196
197
198 Note: File context can be temporarily modified with the chcon command.
199 If you want to permanently change the file context you need to use the
200 semanage fcontext command. This will modify the SELinux labeling data‐
201 base. You will need to use restorecon to apply the labels.
202
203
205 semanage fcontext can also be used to manipulate default file context
206 mappings.
207
208 semanage permissive can also be used to manipulate whether or not a
209 process type is permissive.
210
211 semanage module can also be used to enable/disable/install/remove pol‐
212 icy modules.
213
214 semanage boolean can also be used to manipulate the booleans
215
216
217 system-config-selinux is a GUI tool available to customize SELinux pol‐
218 icy settings.
219
220
222 This manual page was auto-generated using sepolicy manpage .
223
224
226 selinux(8), abrt_handle_event(8), semanage(8), restorecon(8), chcon(1)
227 , setsebool(8)
228
229
230
231abrt_handle_event 15-06-03 abrt_handle_event_selinux(8)