1abrt_upload_watch_selinuSxE(L8i)nux Policy abrt_upload_waabtrcth_upload_watch_selinux(8)
2
3
4

NAME

6       abrt_upload_watch_selinux  -  Security  Enhanced  Linux  Policy for the
7       abrt_upload_watch processes
8

DESCRIPTION

10       Security-Enhanced Linux secures  the  abrt_upload_watch  processes  via
11       flexible mandatory access control.
12
13       The  abrt_upload_watch  processes  execute with the abrt_upload_watch_t
14       SELinux type. You can check if you have these processes running by exe‐
15       cuting the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep abrt_upload_watch_t
20
21
22

ENTRYPOINTS

24       The  abrt_upload_watch_t  SELinux  type can be entered via the abrt_up‐
25       load_watch_exec_t file type.
26
27       The default entrypoint paths for the abrt_upload_watch_t domain are the
28       following:
29
30       /usr/sbin/abrt-upload-watch
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       abrt_upload_watch policy is very flexible allowing users to setup their
40       abrt_upload_watch processes in as secure a method as possible.
41
42       The following process types are defined for abrt_upload_watch:
43
44       abrt_upload_watch_t
45
46       Note: semanage permissive -a abrt_upload_watch_t can be  used  to  make
47       the  process type abrt_upload_watch_t permissive. SELinux does not deny
48       access to permissive process types, but the AVC (SELinux denials)  mes‐
49       sages are still generated.
50
51

BOOLEANS

53       SELinux   policy  is  customizable  based  on  least  access  required.
54       abrt_upload_watch policy is extremely flexible and has several booleans
55       that  allow you to manipulate the policy and run abrt_upload_watch with
56       the tightest access possible.
57
58
59
60       If you want to dontaudit all  daemons  scheduling  requests  (setsched,
61       sys_nice),  you  must turn on the daemons_dontaudit_scheduling boolean.
62       Enabled by default.
63
64       setsebool -P daemons_dontaudit_scheduling 1
65
66
67
68       If you want to allow all domains to execute in fips_mode, you must turn
69       on the fips_mode boolean. Enabled by default.
70
71       setsebool -P fips_mode 1
72
73
74

MANAGED FILES

76       The  SELinux  process type abrt_upload_watch_t can manage files labeled
77       with the following file types.  The paths listed are the default  paths
78       for  these  file  types.  Note the processes UID still need to have DAC
79       permissions.
80
81       abrt_upload_watch_tmp_t
82
83
84       cluster_conf_t
85
86            /etc/cluster(/.*)?
87
88       cluster_var_lib_t
89
90            /var/lib/pcsd(/.*)?
91            /var/lib/cluster(/.*)?
92            /var/lib/openais(/.*)?
93            /var/lib/pengine(/.*)?
94            /var/lib/corosync(/.*)?
95            /usr/lib/heartbeat(/.*)?
96            /var/lib/heartbeat(/.*)?
97            /var/lib/pacemaker(/.*)?
98
99       cluster_var_run_t
100
101            /var/run/crm(/.*)?
102            /var/run/cman_.*
103            /var/run/rsctmp(/.*)?
104            /var/run/aisexec.*
105            /var/run/heartbeat(/.*)?
106            /var/run/pcsd-ruby.socket
107            /var/run/corosync-qnetd(/.*)?
108            /var/run/corosync-qdevice(/.*)?
109            /var/run/corosync.pid
110            /var/run/cpglockd.pid
111            /var/run/rgmanager.pid
112            /var/run/cluster/rgmanager.sk
113
114       public_content_rw_t
115
116            /var/spool/abrt-upload(/.*)?
117
118       root_t
119
120            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
121            /
122            /initrd
123
124

FILE CONTEXTS

126       SELinux requires files to have an extended attribute to define the file
127       type.
128
129       You can see the context of a file using the -Z option to ls
130
131       Policy  governs  the  access  confined  processes  have to these files.
132       SELinux abrt_upload_watch policy is very  flexible  allowing  users  to
133       setup their abrt_upload_watch processes in as secure a method as possi‐
134       ble.
135
136       STANDARD FILE CONTEXT
137
138       SELinux defines the file context types for  the  abrt_upload_watch,  if
139       you  wanted  to  store files with these types in a different paths, you
140       need to execute the semanage command to specify alternate labeling  and
141       then use restorecon to put the labels on disk.
142
143       semanage   fcontext   -a   -t  abrt_upload_watch_exec_t  '/srv/abrt_up‐
144       load_watch/content(/.*)?'
145       restorecon -R -v /srv/myabrt_upload_watch_content
146
147       Note: SELinux often uses regular expressions  to  specify  labels  that
148       match multiple files.
149
150       The following file types are defined for abrt_upload_watch:
151
152
153
154       abrt_upload_watch_exec_t
155
156       -  Set  files  with  the  abrt_upload_watch_exec_t type, if you want to
157       transition an executable to the abrt_upload_watch_t domain.
158
159
160
161       abrt_upload_watch_tmp_t
162
163       - Set files with the abrt_upload_watch_tmp_t type, if you want to store
164       abrt upload watch temporary files in the /tmp directories.
165
166
167
168       Note:  File context can be temporarily modified with the chcon command.
169       If you want to permanently change the file context you need to use  the
170       semanage fcontext command.  This will modify the SELinux labeling data‐
171       base.  You will need to use restorecon to apply the labels.
172
173

SHARING FILES

175       If you want to share files with multiple domains (Apache,  FTP,  rsync,
176       Samba),  you can set a file context of public_content_t and public_con‐
177       tent_rw_t.  These context allow any of the above domains  to  read  the
178       content.   If  you want a particular domain to write to the public_con‐
179       tent_rw_t domain, you must set the appropriate boolean.
180
181       Allow abrt_upload_watch servers to read the /var/abrt_upload_watch  di‐
182       rectory  by  adding the public_content_t file type to the directory and
183       by restoring the file type.
184
185       semanage fcontext -a -t public_content_t "/var/abrt_upload_watch(/.*)?"
186       restorecon -F -R -v /var/abrt_upload_watch
187
188       Allow  abrt_upload_watch  servers  to  read  and  write   /var/abrt_up‐
189       load_watch/incoming  by  adding the public_content_rw_t type to the di‐
190       rectory and by restoring the file type.  You also need to turn  on  the
191       abrt_upload_watch_anon_write boolean.
192
193       semanage fcontext -a -t public_content_rw_t "/var/abrt_upload_watch/in‐
194       coming(/.*)?"
195       restorecon -F -R -v /var/abrt_upload_watch/incoming
196       setsebool -P abrt_upload_watch_anon_write 1
197
198
199       If you want to determine whether abrt-handle-upload can  modify  public
200       files  used  for  public  file transfer services in /var/spool/abrt-up‐
201       load/., you must turn on the abrt_upload_watch_anon_write boolean.
202
203       setsebool -P abrt_upload_watch_anon_write 1
204
205

COMMANDS

207       semanage fcontext can also be used to manipulate default  file  context
208       mappings.
209
210       semanage  permissive  can  also  be used to manipulate whether or not a
211       process type is permissive.
212
213       semanage module can also be used to enable/disable/install/remove  pol‐
214       icy modules.
215
216       semanage boolean can also be used to manipulate the booleans
217
218
219       system-config-selinux is a GUI tool available to customize SELinux pol‐
220       icy settings.
221
222

AUTHOR

224       This manual page was auto-generated using sepolicy manpage .
225
226

SEE ALSO

228       selinux(8), abrt_upload_watch(8), semanage(8), restorecon(8), chcon(1),
229       sepolicy(8), setsebool(8)
230
231
232
233abrt_upload_watch                  23-10-20       abrt_upload_watch_selinux(8)
Impressum