1opensm_selinux(8)            SELinux Policy opensm           opensm_selinux(8)
2
3
4

NAME

6       opensm_selinux  -  Security  Enhanced  Linux Policy for the opensm pro‐
7       cesses
8

DESCRIPTION

10       Security-Enhanced Linux  secures  the  opensm  processes  via  flexible
11       mandatory access control.
12
13       The  opensm  processes  execute with the opensm_t SELinux type. You can
14       check if you have these processes running by executing the  ps  command
15       with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep opensm_t
20
21
22

ENTRYPOINTS

24       The  opensm_t  SELinux  type  can be entered via the opensm_exec_t file
25       type.
26
27       The default entrypoint paths for the opensm_t domain are the following:
28
29       /usr/libexec/opensm-launch
30

PROCESS TYPES

32       SELinux defines process types (domains) for each process running on the
33       system
34
35       You can see the context of a process using the -Z option to ps
36
37       Policy  governs  the  access confined processes have to files.  SELinux
38       opensm policy is very flexible allowing users  to  setup  their  opensm
39       processes in as secure a method as possible.
40
41       The following process types are defined for opensm:
42
43       opensm_t
44
45       Note:  semanage  permissive -a opensm_t can be used to make the process
46       type opensm_t permissive. SELinux does not deny  access  to  permissive
47       process  types, but the AVC (SELinux denials) messages are still gener‐
48       ated.
49
50

BOOLEANS

52       SELinux policy is customizable based on least access required.   opensm
53       policy is extremely flexible and has several booleans that allow you to
54       manipulate the policy and run opensm with the tightest access possible.
55
56
57
58       If you want to allow users to resolve user passwd entries directly from
59       ldap  rather  then  using  a  sssd server, you must turn on the authlo‐
60       gin_nsswitch_use_ldap boolean. Disabled by default.
61
62       setsebool -P authlogin_nsswitch_use_ldap 1
63
64
65
66       If you want to allow all domains to execute in fips_mode, you must turn
67       on the fips_mode boolean. Enabled by default.
68
69       setsebool -P fips_mode 1
70
71
72
73       If  you  want  to allow confined applications to run with kerberos, you
74       must turn on the kerberos_enabled boolean. Enabled by default.
75
76       setsebool -P kerberos_enabled 1
77
78
79
80       If you want to allow system to run with  NIS,  you  must  turn  on  the
81       nis_enabled boolean. Disabled by default.
82
83       setsebool -P nis_enabled 1
84
85
86
87       If  you  want to allow confined applications to use nscd shared memory,
88       you must turn on the nscd_use_shm boolean. Disabled by default.
89
90       setsebool -P nscd_use_shm 1
91
92
93

MANAGED FILES

95       The SELinux process type opensm_t can manage  files  labeled  with  the
96       following file types.  The paths listed are the default paths for these
97       file types.  Note the processes UID still need to have DAC permissions.
98
99       cluster_conf_t
100
101            /etc/cluster(/.*)?
102
103       cluster_var_lib_t
104
105            /var/lib/pcsd(/.*)?
106            /var/lib/cluster(/.*)?
107            /var/lib/openais(/.*)?
108            /var/lib/pengine(/.*)?
109            /var/lib/corosync(/.*)?
110            /usr/lib/heartbeat(/.*)?
111            /var/lib/heartbeat(/.*)?
112            /var/lib/pacemaker(/.*)?
113
114       cluster_var_run_t
115
116            /var/run/crm(/.*)?
117            /var/run/cman_.*
118            /var/run/rsctmp(/.*)?
119            /var/run/aisexec.*
120            /var/run/heartbeat(/.*)?
121            /var/run/corosync-qnetd(/.*)?
122            /var/run/corosync-qdevice(/.*)?
123            /var/run/corosync.pid
124            /var/run/cpglockd.pid
125            /var/run/rgmanager.pid
126            /var/run/cluster/rgmanager.sk
127
128       opensm_cache_t
129
130            /var/cache/opensm(/.*)?
131
132       opensm_log_t
133
134            /var/log/opensm.*
135
136       root_t
137
138            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
139            /
140            /initrd
141
142

FILE CONTEXTS

144       SELinux requires files to have an extended attribute to define the file
145       type.
146
147       You can see the context of a file using the -Z option to ls
148
149       Policy  governs  the  access  confined  processes  have to these files.
150       SELinux opensm policy is very flexible allowing users  to  setup  their
151       opensm processes in as secure a method as possible.
152
153       STANDARD FILE CONTEXT
154
155       SELinux defines the file context types for the opensm, if you wanted to
156       store files with these types in a diffent paths, you  need  to  execute
157       the  semanage  command  to  sepecify  alternate  labeling  and then use
158       restorecon to put the labels on disk.
159
160       semanage  fcontext   -a   -t   opensm_unit_file_t   '/srv/myopensm_con‐
161       tent(/.*)?'
162       restorecon -R -v /srv/myopensm_content
163
164       Note:  SELinux  often  uses  regular expressions to specify labels that
165       match multiple files.
166
167       The following file types are defined for opensm:
168
169
170
171       opensm_cache_t
172
173       - Set files with the opensm_cache_t type, if  you  want  to  store  the
174       files under the /var/cache directory.
175
176
177
178       opensm_exec_t
179
180       -  Set  files with the opensm_exec_t type, if you want to transition an
181       executable to the opensm_t domain.
182
183
184
185       opensm_log_t
186
187       - Set files with the opensm_log_t type, if you want to treat  the  data
188       as opensm log data, usually stored under the /var/log directory.
189
190
191
192       opensm_unit_file_t
193
194       -  Set files with the opensm_unit_file_t type, if you want to treat the
195       files as opensm unit content.
196
197
198
199       Note: File context can be temporarily modified with the chcon  command.
200       If  you want to permanently change the file context you need to use the
201       semanage fcontext command.  This will modify the SELinux labeling data‐
202       base.  You will need to use restorecon to apply the labels.
203
204

COMMANDS

206       semanage  fcontext  can also be used to manipulate default file context
207       mappings.
208
209       semanage permissive can also be used to manipulate  whether  or  not  a
210       process type is permissive.
211
212       semanage  module can also be used to enable/disable/install/remove pol‐
213       icy modules.
214
215       semanage boolean can also be used to manipulate the booleans
216
217
218       system-config-selinux is a GUI tool available to customize SELinux pol‐
219       icy settings.
220
221

AUTHOR

223       This manual page was auto-generated using sepolicy manpage .
224
225

SEE ALSO

227       selinux(8),  opensm(8),  semanage(8),  restorecon(8),  chcon(1), sepol‐
228       icy(8), setsebool(8)
229
230
231
232opensm                             19-06-18                  opensm_selinux(8)
Impressum