Query: svirt_socket_selinux
OS: centos
Section: 8
Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar
svirt_socket_selinux(8) SELinux Policy svirt_socket svirt_socket_selinux(8)NAMEsvirt_socket_selinux - Security Enhanced Linux Policy for the svirt_socket processesDESCRIPTIONSecurity-Enhanced Linux secures the svirt_socket processes via flexible mandatory access control. The svirt_socket processes execute with the svirt_socket_t SELinux type. You can check if you have these processes running by executing the ps command with the -Z qualifier. For example: ps -eZ | grep svirt_socket_tPROCESS TYPESSELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux svirt_socket policy is very flexible allowing users to setup their svirt_socket processes in as secure a method as possible. The following process types are defined for svirt_socket: svirt_socket_t Note: semanage permissive -a svirt_socket_t can be used to make the process type svirt_socket_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated.BOOLEANSSELinux policy is customizable based on least access required. svirt_socket policy is extremely flexible and has several booleans that allow you to manipulate the policy and run svirt_socket with the tightest access possible. If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by default. setsebool -P deny_ptrace 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by default. setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1COMMANDSsemanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings.AUTHORThis manual page was auto-generated using sepolicy manpage .SEE ALSOselinux(8), svirt_socket(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8) svirt_socket 14-06-10 svirt_socket_selinux(8)
Related Man Pages |
---|
cachefiles_kernel_selinux(8) - centos |
nagios_admin_plugin_selinux(8) - centos |
qemu_dm_selinux(8) - centos |
sepgsql_trusted_proc_selinux(8) - centos |
sshd_sandbox_selinux(8) - centos |
Similar Topics in the Unix Linux Community |
---|
NetSPoC 3.1 (Default branch) |
SELinux policy compiler errors for 2.6.26.8.tex1 |
Wrong path resolution |
Checking for processes in Linux |