policy_module(fcoemon, 1.0.0) ######################################## # # Declarations # type fcoemon_t; type fcoemon_exec_t; init_daemon_domain(fcoemon_t, fcoemon_exec_t) type fcoemon_var_run_t; files_pid_file(fcoemon_var_run_t) ######################################## # # fcoemon local policy # # dac_override # /var/rnn/fcm/fcm_clif socket is owned by root allow fcoemon_t self:capability { net_admin dac_override }; allow fcoemon_t self:capability { kill }; allow fcoemon_t self:fifo_file rw_fifo_file_perms; allow fcoemon_t self:unix_stream_socket create_stream_socket_perms; allow fcoemon_t self:netlink_socket create_socket_perms; allow fcoemon_t self:netlink_route_socket create_netlink_socket_perms; manage_dirs_pattern(fcoemon_t, fcoemon_var_run_t, fcoemon_var_run_t) manage_files_pattern(fcoemon_t, fcoemon_var_run_t, fcoemon_var_run_t) manage_sock_files_pattern(fcoemon_t, fcoemon_var_run_t, fcoemon_var_run_t) files_pid_filetrans(fcoemon_t, fcoemon_var_run_t, { dir file sock_file }) files_read_etc_files(fcoemon_t) dev_read_sysfs(fcoemon_t) logging_send_syslog_msg(fcoemon_t) miscfiles_read_localization(fcoemon_t) optional_policy(` lldpad_dgram_send(fcoemon_t) ')