1devicekit_disk_selinux(8)SELinux Policy devicekit_diskdevicekit_disk_selinux(8)
2
3
4

NAME

6       devicekit_disk_selinux   -  Security  Enhanced  Linux  Policy  for  the
7       devicekit_disk processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the devicekit_disk processes via flexi‐
11       ble mandatory access control.
12
13       The  devicekit_disk processes execute with the devicekit_disk_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep devicekit_disk_t
20
21
22

ENTRYPOINTS

24       The   devicekit_disk_t   SELinux   type   can   be   entered   via  the
25       devicekit_disk_exec_t file type.
26
27       The default entrypoint paths for the devicekit_disk_t  domain  are  the
28       following:
29
30       /lib/udisks2/udisksd,                         /lib/udev/udisks-part-id,
31       /usr/lib/udisks2/udisksd,                   /usr/libexec/udisks-daemon,
32       /usr/lib/udev/udisks-part-id,             /usr/libexec/udisks2/udisksd,
33       /usr/lib/udisks/udisks-daemon, /usr/libexec/devkit-disks-daemon
34

PROCESS TYPES

36       SELinux defines process types (domains) for each process running on the
37       system
38
39       You can see the context of a process using the -Z option to ps
40
41       Policy  governs  the  access confined processes have to files.  SELinux
42       devicekit_disk policy is very flexible allowing users  to  setup  their
43       devicekit_disk processes in as secure a method as possible.
44
45       The following process types are defined for devicekit_disk:
46
47       devicekit_disk_t
48
49       Note:  semanage  permissive -a devicekit_disk_t can be used to make the
50       process type devicekit_disk_t permissive. SELinux does not deny  access
51       to permissive process types, but the AVC (SELinux denials) messages are
52       still generated.
53
54

BOOLEANS

56       SELinux  policy  is  customizable  based  on  least  access   required.
57       devicekit_disk  policy  is  extremely flexible and has several booleans
58       that allow you to manipulate the policy and run devicekit_disk with the
59       tightest access possible.
60
61
62
63       If you want to allow users to resolve user passwd entries directly from
64       ldap rather then using a sssd server, you  must  turn  on  the  authlo‐
65       gin_nsswitch_use_ldap boolean. Disabled by default.
66
67       setsebool -P authlogin_nsswitch_use_ldap 1
68
69
70
71       If you want to deny user domains applications to map a memory region as
72       both executable and writable, this  is  dangerous  and  the  executable
73       should be reported in bugzilla, you must turn on the deny_execmem bool‐
74       ean. Enabled by default.
75
76       setsebool -P deny_execmem 1
77
78
79
80       If you want to allow all domains to execute in fips_mode, you must turn
81       on the fips_mode boolean. Enabled by default.
82
83       setsebool -P fips_mode 1
84
85
86
87       If  you  want  to allow confined applications to run with kerberos, you
88       must turn on the kerberos_enabled boolean. Enabled by default.
89
90       setsebool -P kerberos_enabled 1
91
92
93
94       If you want to control the ability to mmap a low area  of  the  address
95       space,  as  configured  by /proc/sys/vm/mmap_min_addr, you must turn on
96       the mmap_low_allowed boolean. Disabled by default.
97
98       setsebool -P mmap_low_allowed 1
99
100
101
102       If you want to allow system to run with  NIS,  you  must  turn  on  the
103       nis_enabled boolean. Disabled by default.
104
105       setsebool -P nis_enabled 1
106
107
108
109       If  you  want to allow confined applications to use nscd shared memory,
110       you must turn on the nscd_use_shm boolean. Disabled by default.
111
112       setsebool -P nscd_use_shm 1
113
114
115
116       If you want to disable kernel module loading,  you  must  turn  on  the
117       secure_mode_insmod boolean. Enabled by default.
118
119       setsebool -P secure_mode_insmod 1
120
121
122
123       If  you  want to allow unconfined executables to make their heap memory
124       executable.  Doing this is a really  bad  idea.  Probably  indicates  a
125       badly  coded  executable, but could indicate an attack. This executable
126       should  be  reported  in  bugzilla,  you  must  turn  on   the   selin‐
127       uxuser_execheap boolean. Disabled by default.
128
129       setsebool -P selinuxuser_execheap 1
130
131
132
133       If  you  want  to allow unconfined executables to make their stack exe‐
134       cutable.  This should never, ever be necessary.  Probably  indicates  a
135       badly  coded  executable, but could indicate an attack. This executable
136       should be reported in bugzilla, you must turn on the  selinuxuser_exec‐
137       stack boolean. Enabled by default.
138
139       setsebool -P selinuxuser_execstack 1
140
141
142

MANAGED FILES

144       The SELinux process type devicekit_disk_t can manage files labeled with
145       the following file types.  The paths listed are the default  paths  for
146       these  file  types.  Note the processes UID still need to have DAC per‐
147       missions.
148
149       file_type
150
151            all files on the system
152
153

FILE CONTEXTS

155       SELinux requires files to have an extended attribute to define the file
156       type.
157
158       You can see the context of a file using the -Z option to ls
159
160       Policy  governs  the  access  confined  processes  have to these files.
161       SELinux devicekit_disk policy is very flexible allowing users to  setup
162       their devicekit_disk processes in as secure a method as possible.
163
164       The following file types are defined for devicekit_disk:
165
166
167
168       devicekit_disk_exec_t
169
170       - Set files with the devicekit_disk_exec_t type, if you want to transi‐
171       tion an executable to the devicekit_disk_t domain.
172
173
174       Paths:
175            /lib/udisks2/udisksd,                    /lib/udev/udisks-part-id,
176            /usr/lib/udisks2/udisksd,              /usr/libexec/udisks-daemon,
177            /usr/lib/udev/udisks-part-id,        /usr/libexec/udisks2/udisksd,
178            /usr/lib/udisks/udisks-daemon, /usr/libexec/devkit-disks-daemon
179
180
181       Note:  File context can be temporarily modified with the chcon command.
182       If you want to permanently change the file context you need to use  the
183       semanage fcontext command.  This will modify the SELinux labeling data‐
184       base.  You will need to use restorecon to apply the labels.
185
186

COMMANDS

188       semanage fcontext can also be used to manipulate default  file  context
189       mappings.
190
191       semanage  permissive  can  also  be used to manipulate whether or not a
192       process type is permissive.
193
194       semanage module can also be used to enable/disable/install/remove  pol‐
195       icy modules.
196
197       semanage boolean can also be used to manipulate the booleans
198
199
200       system-config-selinux is a GUI tool available to customize SELinux pol‐
201       icy settings.
202
203

AUTHOR

205       This manual page was auto-generated using sepolicy manpage .
206
207

SEE ALSO

209       selinux(8), devicekit_disk(8),  semanage(8),  restorecon(8),  chcon(1),
210       sepolicy(8), setsebool(8)
211
212
213
214devicekit_disk                     19-06-18          devicekit_disk_selinux(8)
Impressum