1 policy_module(ceph, 1.1.1)
10 class sock_file unlink;
13 class file { getattr read open };
14 class blk_file { getattr ioctl open read write };
15 class capability2 block_suspend;
18 ########################################
25 init_daemon_domain(ceph_t, ceph_exec_t)
29 type ceph_initrc_exec_t;
30 init_script_file(ceph_initrc_exec_t)
33 logging_log_file(ceph_log_t)
36 files_type(ceph_var_lib_t)
39 files_pid_file(ceph_var_run_t)
41 ########################################
46 allow ceph_t self:process { signal_perms };
47 allow ceph_t self:fifo_file rw_fifo_file_perms;
48 allow ceph_t self:unix_stream_socket create_stream_socket_perms;
49 allow ceph_t self:capability { setuid setgid dac_override };
50 allow ceph_t self:capability2 block_suspend;
52 manage_dirs_pattern(ceph_t, ceph_log_t, ceph_log_t)
53 manage_files_pattern(ceph_t, ceph_log_t, ceph_log_t)
54 manage_lnk_files_pattern(ceph_t, ceph_log_t, ceph_log_t)
56 manage_dirs_pattern(ceph_t, ceph_var_lib_t, ceph_var_lib_t)
57 manage_files_pattern(ceph_t, ceph_var_lib_t, ceph_var_lib_t)
58 manage_lnk_files_pattern(ceph_t, ceph_var_lib_t, ceph_var_lib_t)
60 manage_dirs_pattern(ceph_t, ceph_var_run_t, ceph_var_run_t)
61 manage_files_pattern(ceph_t, ceph_var_run_t, ceph_var_run_t)
62 manage_lnk_files_pattern(ceph_t, ceph_var_run_t, ceph_var_run_t)
64 kernel_read_system_state(ceph_t)
65 kernel_read_network_state(ceph_t)
67 corenet_all_recvfrom_unlabeled(ceph_t)
68 corenet_all_recvfrom_netlabel(ceph_t)
69 corenet_udp_sendrecv_generic_if(ceph_t)
70 corenet_udp_sendrecv_generic_node(ceph_t)
71 corenet_udp_bind_generic_node(ceph_t)
72 corenet_tcp_bind_generic_node(ceph_t)
74 corenet_sendrecv_cyphesis_server_packets(ceph_t)
75 corenet_tcp_bind_cyphesis_port(ceph_t)
76 corenet_tcp_sendrecv_cyphesis_port(ceph_t)
78 corecmd_exec_bin(ceph_t)
79 corecmd_exec_shell(ceph_t)
81 dev_read_urand(ceph_t)
83 domain_read_all_domains_state(ceph_t)
85 fs_getattr_all_fs(ceph_t)
87 auth_use_nsswitch(ceph_t)
89 logging_send_syslog_msg(ceph_t)
91 sysnet_dns_name_resolve(ceph_t)
93 allow ceph_t nvme_device_t:blk_file { getattr ioctl open read write };
95 # basis for future security review
96 allow ceph_t ceph_var_run_t:sock_file { create unlink write setattr };
97 allow ceph_t self:capability { sys_rawio chown };
99 allow ceph_t self:tcp_socket { accept listen };
100 corenet_tcp_connect_cyphesis_port(ceph_t)
101 corenet_tcp_connect_generic_port(ceph_t)
102 files_list_tmp(ceph_t)
103 files_manage_generic_tmp_files(ceph_t)
105 nis_use_ypbind_uncond(ceph_t)
106 storage_raw_rw_fixed_disk(ceph_t)
107 files_manage_generic_locks(ceph_t)
108 libs_exec_ldconfig(ceph_t)
110 allow ceph_t sysfs_t:dir read;
111 allow ceph_t sysfs_t:file { read getattr open };
112 allow ceph_t sysfs_t:lnk_file { read getattr };
114 allow ceph_t random_device_t:chr_file getattr;
115 allow ceph_t urandom_device_t:chr_file getattr;
116 allow ceph_t self:process setpgid;
117 allow ceph_t var_run_t:dir { write create add_name };
118 allow ceph_t var_run_t:file { read write create open getattr };
120 fsadm_manage_pid(ceph_t)
122 #============= setfiles_t ==============
123 allow setfiles_t ceph_var_lib_t:file write;