## policy for fcoemon ######################################## ## ## Transition to fcoemon. ## ## ## ## Domain allowed to transition. ## ## # interface(`fcoemon_domtrans',` gen_require(` type fcoemon_t, fcoemon_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, fcoemon_exec_t, fcoemon_t) ') ######################################## ## ## Read fcoemon PID files. ## ## ## ## Domain allowed access. ## ## # interface(`fcoemon_read_pid_files',` gen_require(` type fcoemon_var_run_t; ') files_search_pids($1) allow $1 fcoemon_var_run_t:file read_file_perms; ') ####################################### ## ## Send to a fcoemon unix dgram socket. ## ## ## ## Domain allowed access. ## ## # interface(`fcoemon_dgram_send',` gen_require(` type fcoemon_t; ') allow $1 fcoemon_t:unix_dgram_socket sendto; ') ######################################## ## ## All of the rules required to administrate ## an fcoemon environment ## ## ## ## Domain allowed access. ## ## # interface(`fcoemon_admin',` gen_require(` type fcoemon_t; type fcoemon_var_run_t; ') allow $1 fcoemon_t:process signal_perms; ps_process_pattern($1, fcoemon_t) tunable_policy(`deny_ptrace',`',` allow $1 fcoemon_t:process ptrace; ') files_search_pids($1) admin_pattern($1, fcoemon_var_run_t) ')