1sandbox_x_selinux(8)       SELinux Policy sandbox_x       sandbox_x_selinux(8)
2
3
4

NAME

6       sandbox_x_selinux  -  Security  Enhanced Linux Policy for the sandbox_x
7       processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the sandbox_x  processes  via  flexible
11       mandatory access control.
12
13       The  sandbox_x processes execute with the sandbox_x_t SELinux type. You
14       can check if you have these processes running by executing the ps  com‐
15       mand with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep sandbox_x_t
20
21
22

PROCESS TYPES

24       SELinux defines process types (domains) for each process running on the
25       system
26
27       You can see the context of a process using the -Z option to ps
28
29       Policy governs the access confined processes have  to  files.   SELinux
30       sandbox_x  policy  is very flexible allowing users to setup their sand‐
31       box_x processes in as secure a method as possible.
32
33       The following process types are defined for sandbox_x:
34
35       sandbox_xserver_t, sandbox_x_t, sandbox_x_client_t
36
37       Note: semanage permissive -a  sandbox_x_t  can  be  used  to  make  the
38       process  type  sandbox_x_t  permissive. SELinux does not deny access to
39       permissive process types, but the AVC (SELinux  denials)  messages  are
40       still generated.
41
42

MCS Constrained

44       The  SELinux  process  type sandbox_x_t is an MCS (Multi Category Secu‐
45       rity) constrained type.  Sometimes this separation is  referred  to  as
46       sVirt.  These types are usually used for securing multi-tenant environ‐
47       ments, such as virtualization, containers or separation of users.   The
48       tools used to launch MCS types, pick out a different MCS label for each
49       process group.
50
51       For example one process might be  launched  with  sandbox_x_t:s0:c1,c2,
52       and  another  process  launched  with sandbox_x_t:s0:c3,c4. The SELinux
53       kernel only allows these processes can only write  to  content  with  a
54       matching  MCS  label,  or a MCS Label of s0. A process running with the
55       MCS level of s0:c1,c2 is not allowed to write to content with  the  MCS
56       label of s0:c3,c4
57
58

BOOLEANS

60       SELinux  policy  is customizable based on least access required.  sand‐
61       box_x policy is extremely flexible and has several booleans that  allow
62       you to manipulate the policy and run sandbox_x with the tightest access
63       possible.
64
65
66
67       If you want to deny user domains applications to map a memory region as
68       both  executable  and  writable,  this  is dangerous and the executable
69       should be reported in bugzilla, you must turn on the deny_execmem bool‐
70       ean. Disabled by default.
71
72       setsebool -P deny_execmem 1
73
74
75
76       If  you  want  to  allow  system  to run with NIS, you must turn on the
77       nis_enabled boolean. Disabled by default.
78
79       setsebool -P nis_enabled 1
80
81
82

MANAGED FILES

84       The SELinux process type sandbox_x_t can manage files labeled with  the
85       following file types.  The paths listed are the default paths for these
86       file types.  Note the processes UID still need to have DAC permissions.
87
88       fusefs_t
89
90            /var/run/user/[0-9]+/gvfs
91
92       krb5_host_rcache_t
93
94            /var/tmp/krb5_0.rcache2
95            /var/cache/krb5rcache(/.*)?
96            /var/tmp/nfs_0
97            /var/tmp/DNS_25
98            /var/tmp/host_0
99            /var/tmp/imap_0
100            /var/tmp/HTTP_23
101            /var/tmp/HTTP_48
102            /var/tmp/ldap_55
103            /var/tmp/ldap_487
104            /var/tmp/ldapmap1_0
105
106       mozilla_plugin_tmpfs_t
107
108
109       sandbox_file_t
110
111
112       sandbox_x_client_tmpfs_t
113
114
115       security_t
116
117            /selinux
118
119

COMMANDS

121       semanage fcontext can also be used to manipulate default  file  context
122       mappings.
123
124       semanage  permissive  can  also  be used to manipulate whether or not a
125       process type is permissive.
126
127       semanage module can also be used to enable/disable/install/remove  pol‐
128       icy modules.
129
130       semanage boolean can also be used to manipulate the booleans
131
132
133       system-config-selinux is a GUI tool available to customize SELinux pol‐
134       icy settings.
135
136

AUTHOR

138       This manual page was auto-generated using sepolicy manpage .
139
140

SEE ALSO

142       selinux(8), sandbox_x(8), semanage(8), restorecon(8), chcon(1),  sepol‐
143       icy(8),      setsebool(8),      sandbox_x_client_selinux(8),      sand‐
144       box_x_client_selinux(8)
145
146
147
148sandbox_x                          23-12-15               sandbox_x_selinux(8)
Impressum