1abrt_selinux(8) SELinux Policy abrt abrt_selinux(8)
2
3
4
6 abrt_selinux - Security Enhanced Linux Policy for the abrt processes
7
9 Security-Enhanced Linux secures the abrt processes via flexible manda‐
10 tory access control.
11
12 The abrt processes execute with the abrt_t SELinux type. You can check
13 if you have these processes running by executing the ps command with
14 the -Z qualifier.
15
16 For example:
17
18 ps -eZ | grep abrt_t
19
20
21
23 The abrt_t SELinux type can be entered via the abrt_exec_t file type.
24
25 The default entrypoint paths for the abrt_t domain are the following:
26
27 /usr/sbin/abrt-harvest.*, /usr/sbin/abrtd, /usr/sbin/abrt-dbus,
28 /usr/sbin/abrt-install-ccpp-hook
29
31 SELinux defines process types (domains) for each process running on the
32 system
33
34 You can see the context of a process using the -Z option to ps
35
36 Policy governs the access confined processes have to files. SELinux
37 abrt policy is very flexible allowing users to setup their abrt pro‐
38 cesses in as secure a method as possible.
39
40 The following process types are defined for abrt:
41
42 abrt_t, abrt_dump_oops_t, abrt_handle_event_t, abrt_helper_t, abrt_retrace_worker_t, abrt_retrace_coredump_t, abrt_watch_log_t, abrt_upload_watch_t
43
44 Note: semanage permissive -a abrt_t can be used to make the process
45 type abrt_t permissive. SELinux does not deny access to permissive
46 process types, but the AVC (SELinux denials) messages are still gener‐
47 ated.
48
49
51 SELinux policy is customizable based on least access required. abrt
52 policy is extremely flexible and has several booleans that allow you to
53 manipulate the policy and run abrt with the tightest access possible.
54
55
56
57 If you want to determine whether ABRT can run in the abrt_han‐
58 dle_event_t domain to handle ABRT event scripts, you must turn on the
59 abrt_handle_event boolean. Disabled by default.
60
61 setsebool -P abrt_handle_event 1
62
63
64
65 If you want to deny user domains applications to map a memory region as
66 both executable and writable, this is dangerous and the executable
67 should be reported in bugzilla, you must turn on the deny_execmem bool‐
68 ean. Enabled by default.
69
70 setsebool -P deny_execmem 1
71
72
73
74 If you want to allow all domains to execute in fips_mode, you must turn
75 on the fips_mode boolean. Enabled by default.
76
77 setsebool -P fips_mode 1
78
79
80
82 The SELinux process type abrt_t can manage files labeled with the fol‐
83 lowing file types. The paths listed are the default paths for these
84 file types. Note the processes UID still need to have DAC permissions.
85
86 abrt_tmp_t
87
88
89 abrt_upload_watch_tmp_t
90
91
92 abrt_var_cache_t
93
94 /var/tmp/abrt(/.*)?
95 /var/cache/abrt(/.*)?
96 /var/spool/abrt(/.*)?
97 /var/spool/debug(/.*)?
98 /var/cache/abrt-di(/.*)?
99 /var/spool/rhsm/debug(/.*)?
100
101 abrt_var_log_t
102
103 /var/log/abrt-logger.*
104
105 cluster_conf_t
106
107 /etc/cluster(/.*)?
108
109 cluster_var_lib_t
110
111 /var/lib/pcsd(/.*)?
112 /var/lib/cluster(/.*)?
113 /var/lib/openais(/.*)?
114 /var/lib/pengine(/.*)?
115 /var/lib/corosync(/.*)?
116 /usr/lib/heartbeat(/.*)?
117 /var/lib/heartbeat(/.*)?
118 /var/lib/pacemaker(/.*)?
119
120 cluster_var_run_t
121
122 /var/run/crm(/.*)?
123 /var/run/cman_.*
124 /var/run/rsctmp(/.*)?
125 /var/run/aisexec.*
126 /var/run/heartbeat(/.*)?
127 /var/run/pcsd-ruby.socket
128 /var/run/corosync-qnetd(/.*)?
129 /var/run/corosync-qdevice(/.*)?
130 /var/run/corosync.pid
131 /var/run/cpglockd.pid
132 /var/run/rgmanager.pid
133 /var/run/cluster/rgmanager.sk
134
135 kdump_crash_t
136
137 /var/crash(/.*)?
138
139 krb5_host_rcache_t
140
141 /var/tmp/krb5_0.rcache2
142 /var/cache/krb5rcache(/.*)?
143 /var/tmp/nfs_0
144 /var/tmp/DNS_25
145 /var/tmp/host_0
146 /var/tmp/imap_0
147 /var/tmp/HTTP_23
148 /var/tmp/HTTP_48
149 /var/tmp/ldap_55
150 /var/tmp/ldap_487
151 /var/tmp/ldapmap1_0
152
153 mail_home_rw_t
154
155 /root/Maildir(/.*)?
156 /root/.esmtp_queue(/.*)?
157 /var/lib/arpwatch/.esmtp_queue(/.*)?
158 /home/[^/]+/.maildir(/.*)?
159 /home/[^/]+/Maildir(/.*)?
160 /home/[^/]+/.esmtp_queue(/.*)?
161
162 rhsmcertd_var_run_t
163
164 /var/run/rhsm(/.*)?
165
166 root_t
167
168 /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
169 /
170 /initrd
171
172 rpm_log_t
173
174 /var/log/dnf.log.*
175 /var/log/dnf.rpm.log.*
176 /var/log/dnf.librepo.log.*
177 /var/log/hawkey.*
178 /var/log/up2date.*
179 /var/log/yum.log.*
180
181 rpm_var_cache_t
182
183 /var/cache/dnf(/.*)?
184 /var/cache/yum(/.*)?
185 /var/spool/up2date(/.*)?
186 /var/cache/PackageKit(/.*)?
187
188 rpm_var_run_t
189
190 /var/run/yum.*
191 /var/run/PackageKit(/.*)?
192
193 sysfs_t
194
195 /sys(/.*)?
196
197
199 SELinux requires files to have an extended attribute to define the file
200 type.
201
202 You can see the context of a file using the -Z option to ls
203
204 Policy governs the access confined processes have to these files.
205 SELinux abrt policy is very flexible allowing users to setup their abrt
206 processes in as secure a method as possible.
207
208 EQUIVALENCE DIRECTORIES
209
210
211 abrt policy stores data with multiple different file context types un‐
212 der the /var/cache/abrt directory. If you would like to store the data
213 in a different directory you can use the semanage command to create an
214 equivalence mapping. If you wanted to store this data under the /srv
215 directory you would execute the following command:
216
217 semanage fcontext -a -e /var/cache/abrt /srv/abrt
218 restorecon -R -v /srv/abrt
219
220 abrt policy stores data with multiple different file context types un‐
221 der the /var/run/abrt directory. If you would like to store the data
222 in a different directory you can use the semanage command to create an
223 equivalence mapping. If you wanted to store this data under the /srv
224 directory you would execute the following command:
225
226 semanage fcontext -a -e /var/run/abrt /srv/abrt
227 restorecon -R -v /srv/abrt
228
229 abrt policy stores data with multiple different file context types un‐
230 der the /var/spool/abrt directory. If you would like to store the data
231 in a different directory you can use the semanage command to create an
232 equivalence mapping. If you wanted to store this data under the /srv
233 directory you would execute the following command:
234
235 semanage fcontext -a -e /var/spool/abrt /srv/abrt
236 restorecon -R -v /srv/abrt
237
238 STANDARD FILE CONTEXT
239
240 SELinux defines the file context types for the abrt, if you wanted to
241 store files with these types in a diffent paths, you need to execute
242 the semanage command to specify alternate labeling and then use re‐
243 storecon to put the labels on disk.
244
245 semanage fcontext -a -t abrt_upload_watch_tmp_t '/srv/myabrt_con‐
246 tent(/.*)?'
247 restorecon -R -v /srv/myabrt_content
248
249 Note: SELinux often uses regular expressions to specify labels that
250 match multiple files.
251
252 The following file types are defined for abrt:
253
254
255
256 abrt_dump_oops_exec_t
257
258 - Set files with the abrt_dump_oops_exec_t type, if you want to transi‐
259 tion an executable to the abrt_dump_oops_t domain.
260
261
262 Paths:
263 /usr/bin/abrt-dump-.*, /usr/bin/abrt-uefioops-oops,
264 /usr/libexec/abrt-hook-ccpp
265
266
267 abrt_etc_t
268
269 - Set files with the abrt_etc_t type, if you want to store abrt files
270 in the /etc directories.
271
272
273
274 abrt_exec_t
275
276 - Set files with the abrt_exec_t type, if you want to transition an ex‐
277 ecutable to the abrt_t domain.
278
279
280 Paths:
281 /usr/sbin/abrt-harvest.*, /usr/sbin/abrtd, /usr/sbin/abrt-dbus,
282 /usr/sbin/abrt-install-ccpp-hook
283
284
285 abrt_handle_event_exec_t
286
287 - Set files with the abrt_handle_event_exec_t type, if you want to
288 transition an executable to the abrt_handle_event_t domain.
289
290
291 Paths:
292 /usr/libexec/abrt-handle-event, /usr/bin/abrt-action-generate-
293 backtrace
294
295
296 abrt_helper_exec_t
297
298 - Set files with the abrt_helper_exec_t type, if you want to transition
299 an executable to the abrt_helper_t domain.
300
301
302
303 abrt_initrc_exec_t
304
305 - Set files with the abrt_initrc_exec_t type, if you want to transition
306 an executable to the abrt_initrc_t domain.
307
308
309
310 abrt_retrace_cache_t
311
312 - Set files with the abrt_retrace_cache_t type, if you want to store
313 the files under the /var/cache directory.
314
315
316 Paths:
317 /var/cache/abrt-retrace(/.*)?, /var/cache/retrace-server(/.*)?
318
319
320 abrt_retrace_coredump_exec_t
321
322 - Set files with the abrt_retrace_coredump_exec_t type, if you want to
323 transition an executable to the abrt_retrace_coredump_t domain.
324
325
326
327 abrt_retrace_spool_t
328
329 - Set files with the abrt_retrace_spool_t type, if you want to store
330 the abrt retrace files under the /var/spool directory.
331
332
333 Paths:
334 /var/spool/faf(/.*)?, /var/spool/abrt-retrace(/.*)?,
335 /var/spool/retrace-server(/.*)?
336
337
338 abrt_retrace_worker_exec_t
339
340 - Set files with the abrt_retrace_worker_exec_t type, if you want to
341 transition an executable to the abrt_retrace_worker_t domain.
342
343
344 Paths:
345 /usr/bin/abrt-retrace-worker, /usr/bin/retrace-server-worker
346
347
348 abrt_tmp_t
349
350 - Set files with the abrt_tmp_t type, if you want to store abrt tempo‐
351 rary files in the /tmp directories.
352
353
354
355 abrt_unit_file_t
356
357 - Set files with the abrt_unit_file_t type, if you want to treat the
358 files as abrt unit content.
359
360
361
362 abrt_upload_watch_exec_t
363
364 - Set files with the abrt_upload_watch_exec_t type, if you want to
365 transition an executable to the abrt_upload_watch_t domain.
366
367
368
369 abrt_upload_watch_tmp_t
370
371 - Set files with the abrt_upload_watch_tmp_t type, if you want to store
372 abrt upload watch temporary files in the /tmp directories.
373
374
375
376 abrt_var_cache_t
377
378 - Set files with the abrt_var_cache_t type, if you want to store the
379 files under the /var/cache directory.
380
381
382 Paths:
383 /var/tmp/abrt(/.*)?, /var/cache/abrt(/.*)?, /var/spool/abrt(/.*)?,
384 /var/spool/debug(/.*)?, /var/cache/abrt-di(/.*)?,
385 /var/spool/rhsm/debug(/.*)?
386
387
388 abrt_var_lib_t
389
390 - Set files with the abrt_var_lib_t type, if you want to store the abrt
391 files under the /var/lib directory.
392
393
394
395 abrt_var_log_t
396
397 - Set files with the abrt_var_log_t type, if you want to treat the data
398 as abrt var log data, usually stored under the /var/log directory.
399
400
401
402 abrt_var_run_t
403
404 - Set files with the abrt_var_run_t type, if you want to store the abrt
405 files under the /run or /var/run directory.
406
407
408 Paths:
409 /var/run/abrt(/.*)?, /var/run/abrtd?.lock, /var/run/abrtd?.socket,
410 /var/run/abrt.pid
411
412
413 abrt_watch_log_exec_t
414
415 - Set files with the abrt_watch_log_exec_t type, if you want to transi‐
416 tion an executable to the abrt_watch_log_t domain.
417
418
419
420 Note: File context can be temporarily modified with the chcon command.
421 If you want to permanently change the file context you need to use the
422 semanage fcontext command. This will modify the SELinux labeling data‐
423 base. You will need to use restorecon to apply the labels.
424
425
427 If you want to share files with multiple domains (Apache, FTP, rsync,
428 Samba), you can set a file context of public_content_t and public_con‐
429 tent_rw_t. These context allow any of the above domains to read the
430 content. If you want a particular domain to write to the public_con‐
431 tent_rw_t domain, you must set the appropriate boolean.
432
433 Allow abrt servers to read the /var/abrt directory by adding the pub‐
434 lic_content_t file type to the directory and by restoring the file
435 type.
436
437 semanage fcontext -a -t public_content_t "/var/abrt(/.*)?"
438 restorecon -F -R -v /var/abrt
439
440 Allow abrt servers to read and write /var/abrt/incoming by adding the
441 public_content_rw_t type to the directory and by restoring the file
442 type. You also need to turn on the abrt_anon_write boolean.
443
444 semanage fcontext -a -t public_content_rw_t "/var/abrt/incoming(/.*)?"
445 restorecon -F -R -v /var/abrt/incoming
446 setsebool -P abrt_anon_write 1
447
448
449 If you want to allow ABRT to modify public files used for public file
450 transfer services., you must turn on the abrt_anon_write boolean.
451
452 setsebool -P abrt_anon_write 1
453
454
456 semanage fcontext can also be used to manipulate default file context
457 mappings.
458
459 semanage permissive can also be used to manipulate whether or not a
460 process type is permissive.
461
462 semanage module can also be used to enable/disable/install/remove pol‐
463 icy modules.
464
465 semanage boolean can also be used to manipulate the booleans
466
467
468 system-config-selinux is a GUI tool available to customize SELinux pol‐
469 icy settings.
470
471
473 This manual page was auto-generated using sepolicy manpage .
474
475
477 selinux(8), abrt(8), semanage(8), restorecon(8), chcon(1), sepolicy(8),
478 setsebool(8), abrt_dump_oops_selinux(8), abrt_dump_oops_selinux(8),
479 abrt_handle_event_selinux(8), abrt_handle_event_selinux(8),
480 abrt_helper_selinux(8), abrt_helper_selinux(8), abrt_retrace_core‐
481 dump_selinux(8), abrt_retrace_coredump_selinux(8), abrt_re‐
482 trace_worker_selinux(8), abrt_retrace_worker_selinux(8), abrt_up‐
483 load_watch_selinux(8), abrt_upload_watch_selinux(8),
484 abrt_watch_log_selinux(8), abrt_watch_log_selinux(8)
485
486
487
488abrt 23-02-03 abrt_selinux(8)