1sosreport_selinux(8)       SELinux Policy sosreport       sosreport_selinux(8)
2
3
4

NAME

6       sosreport_selinux  -  Security  Enhanced Linux Policy for the sosreport
7       processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the sosreport  processes  via  flexible
11       mandatory access control.
12
13       The  sosreport processes execute with the sosreport_t SELinux type. You
14       can check if you have these processes running by executing the ps  com‐
15       mand with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sosreport_t
20
21
22

ENTRYPOINTS

24       The  sosreport_t  SELinux  type can be entered via the file_type, unla‐
25       beled_t, proc_type, filesystem_type,  sosreport_exec_t,  mtrr_device_t,
26       sysctl_type file types.
27
28       The default entrypoint paths for the sosreport_t domain are the follow‐
29       ing:
30
31       all files on the system, /usr/sbin/sosreport, /dev/cpu/mtrr
32

PROCESS TYPES

34       SELinux defines process types (domains) for each process running on the
35       system
36
37       You can see the context of a process using the -Z option to ps
38
39       Policy  governs  the  access confined processes have to files.  SELinux
40       sosreport policy is very flexible allowing users to setup their  sosre‐
41       port processes in as secure a method as possible.
42
43       The following process types are defined for sosreport:
44
45       sosreport_t
46
47       Note:  semanage  permissive  -a  sosreport_t  can  be  used to make the
48       process type sosreport_t permissive. SELinux does not  deny  access  to
49       permissive  process  types,  but the AVC (SELinux denials) messages are
50       still generated.
51
52

BOOLEANS

54       SELinux policy is customizable based on least access required.   sosre‐
55       port  policy  is extremely flexible and has several booleans that allow
56       you to manipulate the policy and run sosreport with the tightest access
57       possible.
58
59
60
61       If you want to allow all domains to use other domains file descriptors,
62       you must turn on the allow_domain_fd_use boolean. Enabled by default.
63
64       setsebool -P allow_domain_fd_use 1
65
66
67
68       If you want to allow unconfined executables to make their  heap  memory
69       executable.   Doing  this  is  a  really bad idea. Probably indicates a
70       badly coded executable, but could indicate an attack.  This  executable
71       should  be  reported  in  bugzilla, you must turn on the allow_execheap
72       boolean. Disabled by default.
73
74       setsebool -P allow_execheap 1
75
76
77
78       If you want to allow unconfined executables to map a memory  region  as
79       both  executable  and  writable,  this  is dangerous and the executable
80       should be reported in bugzilla), you must  turn  on  the  allow_execmem
81       boolean. Enabled by default.
82
83       setsebool -P allow_execmem 1
84
85
86
87       If  you  want  to  allow  all  unconfined  executables to use libraries
88       requiring text relocation that are not  labeled  textrel_shlib_t),  you
89       must turn on the allow_execmod boolean. Enabled by default.
90
91       setsebool -P allow_execmod 1
92
93
94
95       If  you  want  to allow unconfined executables to make their stack exe‐
96       cutable.  This should never, ever be necessary.  Probably  indicates  a
97       badly  coded  executable, but could indicate an attack. This executable
98       should be reported in bugzilla), you must turn on  the  allow_execstack
99       boolean. Enabled by default.
100
101       setsebool -P allow_execstack 1
102
103
104
105       If  you  want  to allow confined applications to run with kerberos, you
106       must turn on the allow_kerberos boolean. Enabled by default.
107
108       setsebool -P allow_kerberos 1
109
110
111
112       If you want to allow sysadm to debug or ptrace all processes, you  must
113       turn on the allow_ptrace boolean. Disabled by default.
114
115       setsebool -P allow_ptrace 1
116
117
118
119       If  you  want  to  allow  system  to run with NIS, you must turn on the
120       allow_ypbind boolean. Disabled by default.
121
122       setsebool -P allow_ypbind 1
123
124
125
126       If you want to allow all domains to have the kernel load  modules,  you
127       must  turn  on  the  domain_kernel_load_modules  boolean.  Disabled  by
128       default.
129
130       setsebool -P domain_kernel_load_modules 1
131
132
133
134       If you want to allow all domains to execute in fips_mode, you must turn
135       on the fips_mode boolean. Enabled by default.
136
137       setsebool -P fips_mode 1
138
139
140
141       If you want to enable reading of urandom for all domains, you must turn
142       on the global_ssp boolean. Disabled by default.
143
144       setsebool -P global_ssp 1
145
146
147
148       If you want to allow certain domains to map low memory in  the  kernel,
149       you must turn on the mmap_low_allowed boolean. Disabled by default.
150
151       setsebool -P mmap_low_allowed 1
152
153
154
155       If  you  want to allow confined applications to use nscd shared memory,
156       you must turn on the nscd_use_shm boolean. Enabled by default.
157
158       setsebool -P nscd_use_shm 1
159
160
161
162       If you want to boolean to determine whether the system permits  loading
163       policy,  setting enforcing mode, and changing boolean values.  Set this
164       to true and you have to reboot to set it back, you  must  turn  on  the
165       secure_mode_policyload boolean. Disabled by default.
166
167       setsebool -P secure_mode_policyload 1
168
169
170
171       If you want to support X userspace object manager, you must turn on the
172       xserver_object_manager boolean. Disabled by default.
173
174       setsebool -P xserver_object_manager 1
175
176
177

MANAGED FILES

179       The SELinux process type sosreport_t can manage files labeled with  the
180       following file types.  The paths listed are the default paths for these
181       file types.  Note the processes UID still need to have DAC permissions.
182
183       file_type
184
185            all files on the system
186
187

FILE CONTEXTS

189       SELinux requires files to have an extended attribute to define the file
190       type.
191
192       You can see the context of a file using the -Z option to ls
193
194       Policy  governs  the  access  confined  processes  have to these files.
195       SELinux sosreport policy is very flexible allowing users to setup their
196       sosreport processes in as secure a method as possible.
197
198       STANDARD FILE CONTEXT
199
200       SELinux defines the file context types for the sosreport, if you wanted
201       to store files with these types in a diffent paths, you need to execute
202       the  semanage  command  to  sepecify  alternate  labeling  and then use
203       restorecon to put the labels on disk.
204
205       semanage  fcontext  -a  -t   sosreport_tmpfs_t   '/srv/mysosreport_con‐
206       tent(/.*)?'
207       restorecon -R -v /srv/mysosreport_content
208
209       Note:  SELinux  often  uses  regular expressions to specify labels that
210       match multiple files.
211
212       The following file types are defined for sosreport:
213
214
215
216       sosreport_exec_t
217
218       - Set files with the sosreport_exec_t type, if you want  to  transition
219       an executable to the sosreport_t domain.
220
221
222
223       sosreport_tmp_t
224
225       -  Set files with the sosreport_tmp_t type, if you want to store sosre‐
226       port temporary files in the /tmp directories.
227
228
229
230       sosreport_tmpfs_t
231
232       - Set files with the sosreport_tmpfs_t type, if you want to store  sos‐
233       report files on a tmpfs file system.
234
235
236
237       Note:  File context can be temporarily modified with the chcon command.
238       If you want to permanently change the file context you need to use  the
239       semanage fcontext command.  This will modify the SELinux labeling data‐
240       base.  You will need to use restorecon to apply the labels.
241
242

COMMANDS

244       semanage fcontext can also be used to manipulate default  file  context
245       mappings.
246
247       semanage  permissive  can  also  be used to manipulate whether or not a
248       process type is permissive.
249
250       semanage module can also be used to enable/disable/install/remove  pol‐
251       icy modules.
252
253       semanage boolean can also be used to manipulate the booleans
254
255
256       system-config-selinux is a GUI tool available to customize SELinux pol‐
257       icy settings.
258
259

AUTHOR

261       This manual page was auto-generated using sepolicy manpage .
262
263

SEE ALSO

265       selinux(8), sosreport(8), semanage(8), restorecon(8), chcon(1) , setse‐
266       bool(8)
267
268
269
270sosreport                          15-06-03               sosreport_selinux(8)
Impressum