1chrome_sandbox_nacl_selSiEnLuixn(u8x)Policy chrome_sandbcohxr_onmaec_lsandbox_nacl_selinux(8)
2
3
4
6 chrome_sandbox_nacl_selinux - Security Enhanced Linux Policy for the
7 chrome_sandbox_nacl processes
8
10 Security-Enhanced Linux secures the chrome_sandbox_nacl processes via
11 flexible mandatory access control.
12
13 The chrome_sandbox_nacl processes execute with the chrome_sand‐
14 box_nacl_t SELinux type. You can check if you have these processes run‐
15 ning by executing the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep chrome_sandbox_nacl_t
20
21
22
24 The chrome_sandbox_nacl_t SELinux type can be entered via the
25 chrome_sandbox_nacl_exec_t, usr_t, bin_t file types.
26
27 The default entrypoint paths for the chrome_sandbox_nacl_t domain are
28 the following:
29
30 All executables with the default executable label, usually stored in
31 /usr/bin and /usr/sbin. /opt/google/chrome[^/]*/nacl_helper_bootstrap,
32 /opt/google/chrome/nacl_helper_bootstrap, /usr/lib/chromium-
33 browser/nacl_helper_bootstrap, /opt/.*, /usr/.*, /emul/.*, /ex‐
34 port(/.*)?, /ostree(/.*)?, /usr/doc(/.*)?/lib(/.*)?, /usr/in‐
35 clu.e(/.*)?, /usr/share/rpm(/.*)?, /usr/share/doc(/.*)?/README.*,
36 /usr/lib/modules(/.*)/vmlinuz, /usr/lib/modules(/.*)/initramfs.img,
37 /usr/lib/sysimage(/.*)?, /usr/lib/ostree-boot(/.*)?, /opt, /usr, /emul
38
40 SELinux defines process types (domains) for each process running on the
41 system
42
43 You can see the context of a process using the -Z option to ps
44
45 Policy governs the access confined processes have to files. SELinux
46 chrome_sandbox_nacl policy is very flexible allowing users to setup
47 their chrome_sandbox_nacl processes in as secure a method as possible.
48
49 The following process types are defined for chrome_sandbox_nacl:
50
51 chrome_sandbox_nacl_t
52
53 Note: semanage permissive -a chrome_sandbox_nacl_t can be used to make
54 the process type chrome_sandbox_nacl_t permissive. SELinux does not
55 deny access to permissive process types, but the AVC (SELinux denials)
56 messages are still generated.
57
58
60 The SELinux process type chrome_sandbox_nacl_t can manage files labeled
61 with the following file types. The paths listed are the default paths
62 for these file types. Note the processes UID still need to have DAC
63 permissions.
64
65 chrome_sandbox_home_t
66
67 /home/[^/]+/.cache/chromium(/.*)?
68 /home/[^/]+/.config/chromium(/.*)?
69 /home/[^/]+/.cache/google-chrome(/.*)?
70 /home/[^/]+/.cache/google-chrome-unstable(/.*)?
71
72 chrome_sandbox_tmpfs_t
73
74
75
77 SELinux requires files to have an extended attribute to define the file
78 type.
79
80 You can see the context of a file using the -Z option to ls
81
82 Policy governs the access confined processes have to these files.
83 SELinux chrome_sandbox_nacl policy is very flexible allowing users to
84 setup their chrome_sandbox_nacl processes in as secure a method as pos‐
85 sible.
86
87 The following file types are defined for chrome_sandbox_nacl:
88
89
90
91 chrome_sandbox_nacl_exec_t
92
93 - Set files with the chrome_sandbox_nacl_exec_t type, if you want to
94 transition an executable to the chrome_sandbox_nacl_t domain.
95
96
97 Paths:
98 /opt/google/chrome[^/]*/nacl_helper_bootstrap,
99 /opt/google/chrome/nacl_helper_bootstrap, /usr/lib/chromium-
100 browser/nacl_helper_bootstrap
101
102
103 Note: File context can be temporarily modified with the chcon command.
104 If you want to permanently change the file context you need to use the
105 semanage fcontext command. This will modify the SELinux labeling data‐
106 base. You will need to use restorecon to apply the labels.
107
108
110 semanage fcontext can also be used to manipulate default file context
111 mappings.
112
113 semanage permissive can also be used to manipulate whether or not a
114 process type is permissive.
115
116 semanage module can also be used to enable/disable/install/remove pol‐
117 icy modules.
118
119
120 system-config-selinux is a GUI tool available to customize SELinux pol‐
121 icy settings.
122
123
125 This manual page was auto-generated using sepolicy manpage .
126
127
129 selinux(8), chrome_sandbox_nacl(8), semanage(8), restorecon(8),
130 chcon(1), sepolicy(8)
131
132
133
134chrome_sandbox_nacl 22-05-27 chrome_sandbox_nacl_selinux(8)