1abrt_upload_watch_selinuSxE(L8i)nux Policy abrt_upload_waabtrcth_upload_watch_selinux(8)
2
3
4
6 abrt_upload_watch_selinux - Security Enhanced Linux Policy for the
7 abrt_upload_watch processes
8
10 Security-Enhanced Linux secures the abrt_upload_watch processes via
11 flexible mandatory access control.
12
13 The abrt_upload_watch processes execute with the abrt_upload_watch_t
14 SELinux type. You can check if you have these processes running by exe‐
15 cuting the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep abrt_upload_watch_t
20
21
22
24 The abrt_upload_watch_t SELinux type can be entered via the abrt_up‐
25 load_watch_exec_t file type.
26
27 The default entrypoint paths for the abrt_upload_watch_t domain are the
28 following:
29
30 /usr/sbin/abrt-upload-watch
31
33 SELinux defines process types (domains) for each process running on the
34 system
35
36 You can see the context of a process using the -Z option to ps
37
38 Policy governs the access confined processes have to files. SELinux
39 abrt_upload_watch policy is very flexible allowing users to setup their
40 abrt_upload_watch processes in as secure a method as possible.
41
42 The following process types are defined for abrt_upload_watch:
43
44 abrt_upload_watch_t
45
46 Note: semanage permissive -a abrt_upload_watch_t can be used to make
47 the process type abrt_upload_watch_t permissive. SELinux does not deny
48 access to permissive process types, but the AVC (SELinux denials) mes‐
49 sages are still generated.
50
51
53 SELinux policy is customizable based on least access required.
54 abrt_upload_watch policy is extremely flexible and has several booleans
55 that allow you to manipulate the policy and run abrt_upload_watch with
56 the tightest access possible.
57
58
59
60 If you want to allow all domains to execute in fips_mode, you must turn
61 on the fips_mode boolean. Enabled by default.
62
63 setsebool -P fips_mode 1
64
65
66
68 The SELinux process type abrt_upload_watch_t can manage files labeled
69 with the following file types. The paths listed are the default paths
70 for these file types. Note the processes UID still need to have DAC
71 permissions.
72
73 abrt_upload_watch_tmp_t
74
75
76 cluster_conf_t
77
78 /etc/cluster(/.*)?
79
80 cluster_var_lib_t
81
82 /var/lib/pcsd(/.*)?
83 /var/lib/cluster(/.*)?
84 /var/lib/openais(/.*)?
85 /var/lib/pengine(/.*)?
86 /var/lib/corosync(/.*)?
87 /usr/lib/heartbeat(/.*)?
88 /var/lib/heartbeat(/.*)?
89 /var/lib/pacemaker(/.*)?
90
91 cluster_var_run_t
92
93 /var/run/crm(/.*)?
94 /var/run/cman_.*
95 /var/run/rsctmp(/.*)?
96 /var/run/aisexec.*
97 /var/run/heartbeat(/.*)?
98 /var/run/pcsd-ruby.socket
99 /var/run/corosync-qnetd(/.*)?
100 /var/run/corosync-qdevice(/.*)?
101 /var/run/corosync.pid
102 /var/run/cpglockd.pid
103 /var/run/rgmanager.pid
104 /var/run/cluster/rgmanager.sk
105
106 public_content_rw_t
107
108 /var/spool/abrt-upload(/.*)?
109
110 root_t
111
112 /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
113 /
114 /initrd
115
116
118 SELinux requires files to have an extended attribute to define the file
119 type.
120
121 You can see the context of a file using the -Z option to ls
122
123 Policy governs the access confined processes have to these files.
124 SELinux abrt_upload_watch policy is very flexible allowing users to
125 setup their abrt_upload_watch processes in as secure a method as possi‐
126 ble.
127
128 STANDARD FILE CONTEXT
129
130 SELinux defines the file context types for the abrt_upload_watch, if
131 you wanted to store files with these types in a diffent paths, you need
132 to execute the semanage command to sepecify alternate labeling and then
133 use restorecon to put the labels on disk.
134
135 semanage fcontext -a -t abrt_upload_watch_tmp_t '/srv/myabrt_up‐
136 load_watch_content(/.*)?'
137 restorecon -R -v /srv/myabrt_upload_watch_content
138
139 Note: SELinux often uses regular expressions to specify labels that
140 match multiple files.
141
142 The following file types are defined for abrt_upload_watch:
143
144
145
146 abrt_upload_watch_exec_t
147
148 - Set files with the abrt_upload_watch_exec_t type, if you want to
149 transition an executable to the abrt_upload_watch_t domain.
150
151
152
153 abrt_upload_watch_tmp_t
154
155 - Set files with the abrt_upload_watch_tmp_t type, if you want to store
156 abrt upload watch temporary files in the /tmp directories.
157
158
159
160 Note: File context can be temporarily modified with the chcon command.
161 If you want to permanently change the file context you need to use the
162 semanage fcontext command. This will modify the SELinux labeling data‐
163 base. You will need to use restorecon to apply the labels.
164
165
167 If you want to share files with multiple domains (Apache, FTP, rsync,
168 Samba), you can set a file context of public_content_t and public_con‐
169 tent_rw_t. These context allow any of the above domains to read the
170 content. If you want a particular domain to write to the public_con‐
171 tent_rw_t domain, you must set the appropriate boolean.
172
173 Allow abrt_upload_watch servers to read the /var/abrt_upload_watch di‐
174 rectory by adding the public_content_t file type to the directory and
175 by restoring the file type.
176
177 semanage fcontext -a -t public_content_t "/var/abrt_upload_watch(/.*)?"
178 restorecon -F -R -v /var/abrt_upload_watch
179
180 Allow abrt_upload_watch servers to read and write /var/abrt_up‐
181 load_watch/incoming by adding the public_content_rw_t type to the di‐
182 rectory and by restoring the file type. You also need to turn on the
183 abrt_upload_watch_anon_write boolean.
184
185 semanage fcontext -a -t public_content_rw_t "/var/abrt_upload_watch/in‐
186 coming(/.*)?"
187 restorecon -F -R -v /var/abrt_upload_watch/incoming
188 setsebool -P abrt_upload_watch_anon_write 1
189
190
191 If you want to determine whether abrt-handle-upload can modify public
192 files used for public file transfer services in /var/spool/abrt-up‐
193 load/., you must turn on the abrt_upload_watch_anon_write boolean.
194
195 setsebool -P abrt_upload_watch_anon_write 1
196
197
199 semanage fcontext can also be used to manipulate default file context
200 mappings.
201
202 semanage permissive can also be used to manipulate whether or not a
203 process type is permissive.
204
205 semanage module can also be used to enable/disable/install/remove pol‐
206 icy modules.
207
208 semanage boolean can also be used to manipulate the booleans
209
210
211 system-config-selinux is a GUI tool available to customize SELinux pol‐
212 icy settings.
213
214
216 This manual page was auto-generated using sepolicy manpage .
217
218
220 selinux(8), abrt_upload_watch(8), semanage(8), restorecon(8), chcon(1),
221 sepolicy(8), setsebool(8)
222
223
224
225abrt_upload_watch 21-06-09 abrt_upload_watch_selinux(8)