1unconfined_cronjob_selinSuExL(i8n)ux Policy unconfined_curnocnojnofbined_cronjob_selinux(8)
2
3
4
6 unconfined_cronjob_selinux - Security Enhanced Linux Policy for the
7 unconfined_cronjob processes
8
10 Security-Enhanced Linux secures the unconfined_cronjob processes via
11 flexible mandatory access control.
12
13 The unconfined_cronjob processes execute with the unconfined_cronjob_t
14 SELinux type. You can check if you have these processes running by exe‐
15 cuting the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep unconfined_cronjob_t
20
21
22
24 SELinux defines process types (domains) for each process running on the
25 system
26
27 You can see the context of a process using the -Z option to ps
28
29 Policy governs the access confined processes have to files. SELinux
30 unconfined_cronjob policy is very flexible allowing users to setup
31 their unconfined_cronjob processes in as secure a method as possible.
32
33 The following process types are defined for unconfined_cronjob:
34
35 unconfined_cronjob_t
36
37 Note: semanage permissive -a unconfined_cronjob_t can be used to make
38 the process type unconfined_cronjob_t permissive. SELinux does not deny
39 access to permissive process types, but the AVC (SELinux denials) mes‐
40 sages are still generated.
41
42
44 SELinux policy is customizable based on least access required. uncon‐
45 fined_cronjob policy is extremely flexible and has several booleans
46 that allow you to manipulate the policy and run unconfined_cronjob with
47 the tightest access possible.
48
49
50
51 If you want to deny user domains applications to map a memory region as
52 both executable and writable, this is dangerous and the executable
53 should be reported in bugzilla, you must turn on the deny_execmem bool‐
54 ean. Enabled by default.
55
56 setsebool -P deny_execmem 1
57
58
59
60 If you want to control the ability to mmap a low area of the address
61 space, as configured by /proc/sys/vm/mmap_min_addr, you must turn on
62 the mmap_low_allowed boolean. Disabled by default.
63
64 setsebool -P mmap_low_allowed 1
65
66
67
68 If you want to disable kernel module loading, you must turn on the
69 secure_mode_insmod boolean. Enabled by default.
70
71 setsebool -P secure_mode_insmod 1
72
73
74
75 If you want to allow unconfined executables to make their heap memory
76 executable. Doing this is a really bad idea. Probably indicates a
77 badly coded executable, but could indicate an attack. This executable
78 should be reported in bugzilla, you must turn on the selin‐
79 uxuser_execheap boolean. Disabled by default.
80
81 setsebool -P selinuxuser_execheap 1
82
83
84
85 If you want to allow unconfined executables to make their stack exe‐
86 cutable. This should never, ever be necessary. Probably indicates a
87 badly coded executable, but could indicate an attack. This executable
88 should be reported in bugzilla, you must turn on the selinuxuser_exec‐
89 stack boolean. Disabled by default.
90
91 setsebool -P selinuxuser_execstack 1
92
93
94
96 The SELinux process type unconfined_cronjob_t can manage files labeled
97 with the following file types. The paths listed are the default paths
98 for these file types. Note the processes UID still need to have DAC
99 permissions.
100
101 file_type
102
103 all files on the system
104
105
107 semanage fcontext can also be used to manipulate default file context
108 mappings.
109
110 semanage permissive can also be used to manipulate whether or not a
111 process type is permissive.
112
113 semanage module can also be used to enable/disable/install/remove pol‐
114 icy modules.
115
116 semanage boolean can also be used to manipulate the booleans
117
118
119 system-config-selinux is a GUI tool available to customize SELinux pol‐
120 icy settings.
121
122
124 This manual page was auto-generated using sepolicy manpage .
125
126
128 selinux(8), unconfined_cronjob(8), semanage(8), restorecon(8),
129 chcon(1), sepolicy(8), setsebool(8)
130
131
132
133unconfined_cronjob 20-05-05 unconfined_cronjob_selinux(8)