## policy for fcoemon
########################################
##
## Transition to fcoemon.
##
##
##
## Domain allowed to transition.
##
##
#
interface(`fcoemon_domtrans',`
gen_require(`
type fcoemon_t, fcoemon_exec_t;
')
corecmd_search_bin($1)
domtrans_pattern($1, fcoemon_exec_t, fcoemon_t)
')
########################################
##
## Read fcoemon PID files.
##
##
##
## Domain allowed access.
##
##
#
interface(`fcoemon_read_pid_files',`
gen_require(`
type fcoemon_var_run_t;
')
files_search_pids($1)
allow $1 fcoemon_var_run_t:file read_file_perms;
')
#######################################
##
## Send to a fcoemon unix dgram socket.
##
##
##
## Domain allowed access.
##
##
#
interface(`fcoemon_dgram_send',`
gen_require(`
type fcoemon_t;
')
allow $1 fcoemon_t:unix_dgram_socket sendto;
')
########################################
##
## All of the rules required to administrate
## an fcoemon environment
##
##
##
## Domain allowed access.
##
##
#
interface(`fcoemon_admin',`
gen_require(`
type fcoemon_t;
type fcoemon_var_run_t;
')
allow $1 fcoemon_t:process signal_perms;
ps_process_pattern($1, fcoemon_t)
tunable_policy(`deny_ptrace',`',`
allow $1 fcoemon_t:process ptrace;
')
files_search_pids($1)
admin_pattern($1, fcoemon_var_run_t)
')