1rpcd_selinux(8)               SELinux Policy rpcd              rpcd_selinux(8)
2
3
4

NAME

6       rpcd_selinux - Security Enhanced Linux Policy for the rpcd processes
7

DESCRIPTION

9       Security-Enhanced  Linux secures the rpcd processes via flexible manda‐
10       tory access control.
11
12       The rpcd processes execute with the rpcd_t SELinux type. You can  check
13       if  you  have  these processes running by executing the ps command with
14       the -Z qualifier.
15
16       For example:
17
18       ps -eZ | grep rpcd_t
19
20
21

ENTRYPOINTS

23       The rpcd_t SELinux type can be entered via the rpcd_exec_t file type.
24
25       The default entrypoint paths for the rpcd_t domain are the following:
26
27       /sbin/rpc..*, /usr/sbin/rpc..*,  /sbin/sm-notify,  /usr/sbin/sm-notify,
28       /usr/sbin/rpc.idmapd, /usr/sbin/rpc.rquotad
29

PROCESS TYPES

31       SELinux defines process types (domains) for each process running on the
32       system
33
34       You can see the context of a process using the -Z option to ps
35
36       Policy governs the access confined processes have  to  files.   SELinux
37       rpcd  policy  is  very flexible allowing users to setup their rpcd pro‐
38       cesses in as secure a method as possible.
39
40       The following process types are defined for rpcd:
41
42       rpcd_t
43
44       Note: semanage permissive -a rpcd_t can be used  to  make  the  process
45       type  rpcd_t  permissive.  SELinux  does  not deny access to permissive
46       process types, but the AVC (SELinux denials) messages are still  gener‐
47       ated.
48
49

BOOLEANS

51       SELinux  policy  is  customizable based on least access required.  rpcd
52       policy is extremely flexible and has several booleans that allow you to
53       manipulate the policy and run rpcd with the tightest access possible.
54
55
56
57       If you want to allow rpcd_t  to manage fuse files, you must turn on the
58       rpcd_use_fusefs boolean. Disabled by default.
59
60       setsebool -P rpcd_use_fusefs 1
61
62
63
64       If you want to allow users to resolve user passwd entries directly from
65       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
66       gin_nsswitch_use_ldap boolean. Disabled by default.
67
68       setsebool -P authlogin_nsswitch_use_ldap 1
69
70
71
72       If you want to allow all domains to execute in fips_mode, you must turn
73       on the fips_mode boolean. Enabled by default.
74
75       setsebool -P fips_mode 1
76
77
78
79       If  you  want  to allow confined applications to run with kerberos, you
80       must turn on the kerberos_enabled boolean. Enabled by default.
81
82       setsebool -P kerberos_enabled 1
83
84
85
86       If you want to allow system to run with  NIS,  you  must  turn  on  the
87       nis_enabled boolean. Disabled by default.
88
89       setsebool -P nis_enabled 1
90
91
92
93       If  you  want to allow confined applications to use nscd shared memory,
94       you must turn on the nscd_use_shm boolean. Disabled by default.
95
96       setsebool -P nscd_use_shm 1
97
98
99

MANAGED FILES

101       The SELinux process type rpcd_t can manage files labeled with the  fol‐
102       lowing  file  types.   The paths listed are the default paths for these
103       file types.  Note the processes UID still need to have DAC permissions.
104
105       cluster_conf_t
106
107            /etc/cluster(/.*)?
108
109       cluster_tmp_t
110
111
112       cluster_var_lib_t
113
114            /var/lib/pcsd(/.*)?
115            /var/lib/cluster(/.*)?
116            /var/lib/openais(/.*)?
117            /var/lib/pengine(/.*)?
118            /var/lib/corosync(/.*)?
119            /usr/lib/heartbeat(/.*)?
120            /var/lib/heartbeat(/.*)?
121            /var/lib/pacemaker(/.*)?
122
123       cluster_var_run_t
124
125            /var/run/crm(/.*)?
126            /var/run/cman_.*
127            /var/run/rsctmp(/.*)?
128            /var/run/aisexec.*
129            /var/run/heartbeat(/.*)?
130            /var/run/corosync-qnetd(/.*)?
131            /var/run/corosync-qdevice(/.*)?
132            /var/run/corosync.pid
133            /var/run/cpglockd.pid
134            /var/run/rgmanager.pid
135            /var/run/cluster/rgmanager.sk
136
137       fusefs_t
138
139            /var/run/user/[^/]*/gvfs
140
141       quota_db_t
142
143            /a?quota.(user|group)
144            /etc/a?quota.(user|group)
145            /var/a?quota.(user|group)
146            /boot/a?quota.(user|group)
147            /var/spool/(.*/)?a?quota.(user|group)
148            /var/spool/cron/a?quota.(user|group)
149            /var/lib/openshift/a?quota.(user|group)
150            /var/lib/stickshift/a?quota.(user|group)
151            /home/[^/]+/a?quota.(user|group)
152            /home/a?quota.(user|group)
153
154       root_t
155
156            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
157            /
158            /initrd
159
160       rpcd_lock_t
161
162            /var/run/rpc.statd.lock
163
164       rpcd_var_run_t
165
166            /var/run/ganesha.*
167            /var/run/sm-notify.*
168            /var/run/rpc.statd(/.*)?
169            /var/run/rpc.statd.pid
170
171       var_lib_nfs_t
172
173            /var/lib/nfs(/.*)?
174
175       var_lib_t
176
177            /opt/(.*/)?var/lib(/.*)?
178            /var/lib(/.*)?
179
180

FILE CONTEXTS

182       SELinux requires files to have an extended attribute to define the file
183       type.
184
185       You can see the context of a file using the -Z option to ls
186
187       Policy  governs  the  access  confined  processes  have to these files.
188       SELinux rpcd policy is very flexible allowing users to setup their rpcd
189       processes in as secure a method as possible.
190
191       EQUIVALENCE DIRECTORIES
192
193
194       rpcd  policy  stores  data  with  multiple different file context types
195       under the /var/run/rpc.statd directory.  If you would like to store the
196       data  in a different directory you can use the semanage command to cre‐
197       ate an equivalence mapping.  If you wanted to store this data under the
198       /srv dirctory you would execute the following command:
199
200       semanage fcontext -a -e /var/run/rpc.statd /srv/rpc.statd
201       restorecon -R -v /srv/rpc.statd
202
203       STANDARD FILE CONTEXT
204
205       SELinux  defines  the file context types for the rpcd, if you wanted to
206       store files with these types in a diffent paths, you  need  to  execute
207       the  semanage  command  to  sepecify  alternate  labeling  and then use
208       restorecon to put the labels on disk.
209
210       semanage fcontext -a -t rpcd_unit_file_t '/srv/myrpcd_content(/.*)?'
211       restorecon -R -v /srv/myrpcd_content
212
213       Note: SELinux often uses regular expressions  to  specify  labels  that
214       match multiple files.
215
216       The following file types are defined for rpcd:
217
218
219
220       rpcd_exec_t
221
222       -  Set  files  with  the rpcd_exec_t type, if you want to transition an
223       executable to the rpcd_t domain.
224
225
226       Paths:
227            /sbin/rpc..*,  /usr/sbin/rpc..*,  /sbin/sm-notify,   /usr/sbin/sm-
228            notify, /usr/sbin/rpc.idmapd, /usr/sbin/rpc.rquotad
229
230
231       rpcd_initrc_exec_t
232
233       - Set files with the rpcd_initrc_exec_t type, if you want to transition
234       an executable to the rpcd_initrc_t domain.
235
236
237       Paths:
238            /etc/rc.d/init.d/nfslock, /etc/rc.d/init.d/rpcidmapd
239
240
241       rpcd_lock_t
242
243       - Set files with the rpcd_lock_t type, if you want to treat  the  files
244       as rpcd lock data, stored under the /var/lock directory
245
246
247
248       rpcd_unit_file_t
249
250       -  Set  files  with the rpcd_unit_file_t type, if you want to treat the
251       files as rpcd unit content.
252
253
254
255       rpcd_var_run_t
256
257       - Set files with the rpcd_var_run_t type, if you want to store the rpcd
258       files under the /run or /var/run directory.
259
260
261       Paths:
262            /var/run/ganesha.*,                          /var/run/sm-notify.*,
263            /var/run/rpc.statd(/.*)?, /var/run/rpc.statd.pid
264
265
266       Note: File context can be temporarily modified with the chcon  command.
267       If  you want to permanently change the file context you need to use the
268       semanage fcontext command.  This will modify the SELinux labeling data‐
269       base.  You will need to use restorecon to apply the labels.
270
271

COMMANDS

273       semanage  fcontext  can also be used to manipulate default file context
274       mappings.
275
276       semanage permissive can also be used to manipulate  whether  or  not  a
277       process type is permissive.
278
279       semanage  module can also be used to enable/disable/install/remove pol‐
280       icy modules.
281
282       semanage boolean can also be used to manipulate the booleans
283
284
285       system-config-selinux is a GUI tool available to customize SELinux pol‐
286       icy settings.
287
288

AUTHOR

290       This manual page was auto-generated using sepolicy manpage .
291
292

SEE ALSO

294       selinux(8), rpcd(8), semanage(8), restorecon(8), chcon(1), sepolicy(8),
295       setsebool(8)
296
297
298
299rpcd                               19-05-30                    rpcd_selinux(8)
Impressum