1chrome_sandbox_nacl_selSiEnLuixn(u8x)Policy chrome_sandbcohxr_onmaec_lsandbox_nacl_selinux(8)
2
3
4

NAME

6       chrome_sandbox_nacl_selinux  -  Security  Enhanced Linux Policy for the
7       chrome_sandbox_nacl processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the chrome_sandbox_nacl  processes  via
11       flexible mandatory access control.
12
13       The   chrome_sandbox_nacl   processes  execute  with  the  chrome_sand‐
14       box_nacl_t SELinux type. You can check if you have these processes run‐
15       ning by executing the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep chrome_sandbox_nacl_t
20
21
22

ENTRYPOINTS

24       The  chrome_sandbox_nacl_t  SELinux  type can be entered via the usr_t,
25       chrome_sandbox_nacl_exec_t, bin_t file types.
26
27       The default entrypoint paths for the chrome_sandbox_nacl_t  domain  are
28       the following:
29
30       All  executables  with  the default executable label, usually stored in
31       /usr/bin and /usr/sbin.   /opt/.*,  /usr/.*,  /emul/.*,  /export(/.*)?,
32       /ostree(/.*)?,       /usr/doc(/.*)?/lib(/.*)?,      /usr/inclu.e(/.*)?,
33       /usr/share/rpm(/.*)?,   /usr/share/doc(/.*)?/README.*,    /usr/lib/mod‐
34       ules(/.*)/vmlinuz, /usr/lib/modules(/.*)/initramfs.img, /usr/lib/sysim‐
35       age(/.*)?,    /usr/lib/ostree-boot(/.*)?,    /opt,     /usr,     /emul,
36       /opt/google/chrome[^/]*/nacl_helper_bootstrap,
37       /opt/google/chrome/nacl_helper_bootstrap,            /usr/lib/chromium-
38       browser/nacl_helper_bootstrap
39

PROCESS TYPES

41       SELinux defines process types (domains) for each process running on the
42       system
43
44       You can see the context of a process using the -Z option to ps
45
46       Policy governs the access confined processes have  to  files.   SELinux
47       chrome_sandbox_nacl  policy  is  very  flexible allowing users to setup
48       their chrome_sandbox_nacl processes in as secure a method as possible.
49
50       The following process types are defined for chrome_sandbox_nacl:
51
52       chrome_sandbox_nacl_t
53
54       Note: semanage permissive -a chrome_sandbox_nacl_t can be used to  make
55       the  process  type  chrome_sandbox_nacl_t  permissive. SELinux does not
56       deny access to permissive process types, but the AVC (SELinux  denials)
57       messages are still generated.
58
59

MANAGED FILES

61       The SELinux process type chrome_sandbox_nacl_t can manage files labeled
62       with the following file types.  The paths listed are the default  paths
63       for  these  file  types.  Note the processes UID still need to have DAC
64       permissions.
65
66       chrome_sandbox_home_t
67
68            /home/[^/]+/.cache/chromium(/.*)?
69            /home/[^/]+/.config/chromium(/.*)?
70            /home/[^/]+/.cache/google-chrome(/.*)?
71            /home/[^/]+/.cache/google-chrome-unstable(/.*)?
72
73       chrome_sandbox_tmpfs_t
74
75
76

FILE CONTEXTS

78       SELinux requires files to have an extended attribute to define the file
79       type.
80
81       You can see the context of a file using the -Z option to ls
82
83       Policy  governs  the  access  confined  processes  have to these files.
84       SELinux chrome_sandbox_nacl policy is very flexible allowing  users  to
85       setup their chrome_sandbox_nacl processes in as secure a method as pos‐
86       sible.
87
88       STANDARD FILE CONTEXT
89
90       SELinux defines the file context types for the chrome_sandbox_nacl,  if
91       you  wanted  to  store files with these types in a different paths, you
92       need to execute the semanage command to specify alternate labeling  and
93       then use restorecon to put the labels on disk.
94
95       semanage  fcontext  -a -t chrome_sandbox_nacl_exec_t '/srv/chrome_sand‐
96       box_nacl/content(/.*)?'
97       restorecon -R -v /srv/mychrome_sandbox_nacl_content
98
99       Note: SELinux often uses regular expressions  to  specify  labels  that
100       match multiple files.
101
102       The following file types are defined for chrome_sandbox_nacl:
103
104
105
106       chrome_sandbox_nacl_exec_t
107
108       -  Set  files  with the chrome_sandbox_nacl_exec_t type, if you want to
109       transition an executable to the chrome_sandbox_nacl_t domain.
110
111
112       Paths:
113            /opt/google/chrome[^/]*/nacl_helper_bootstrap,
114            /opt/google/chrome/nacl_helper_bootstrap,       /usr/lib/chromium-
115            browser/nacl_helper_bootstrap
116
117
118       Note: File context can be temporarily modified with the chcon  command.
119       If  you want to permanently change the file context you need to use the
120       semanage fcontext command.  This will modify the SELinux labeling data‐
121       base.  You will need to use restorecon to apply the labels.
122
123

COMMANDS

125       semanage  fcontext  can also be used to manipulate default file context
126       mappings.
127
128       semanage permissive can also be used to manipulate  whether  or  not  a
129       process type is permissive.
130
131       semanage  module can also be used to enable/disable/install/remove pol‐
132       icy modules.
133
134
135       system-config-selinux is a GUI tool available to customize SELinux pol‐
136       icy settings.
137
138

AUTHOR

140       This manual page was auto-generated using sepolicy manpage .
141
142

SEE ALSO

144       selinux(8),    chrome_sandbox_nacl(8),    semanage(8),   restorecon(8),
145       chcon(1), sepolicy(8)
146
147
148
149chrome_sandbox_nacl                23-10-20     chrome_sandbox_nacl_selinux(8)
Impressum