1 policy_module(vpp-custom,1.0)
3 ########################################
12 type systemd_sysctl_t;
13 class capability sys_admin;
18 init_daemon_domain(vpp_t, vpp_exec_t)
21 files_config_file(vpp_config_rw_t)
23 type vpp_lib_t; # if there is vpp_var_lib_t, we don't need vpp_lib_t
27 logging_log_file(vpp_log_t)
30 files_type(vpp_var_run_t)
33 systemd_unit_file(vpp_unit_file_t)
36 files_tmpfs_file(vpp_tmpfs_t)
39 files_tmp_file(vpp_tmp_t)
41 ########################################
46 allow vpp_t self:capability { dac_override ipc_lock setgid sys_rawio net_raw sys_admin net_admin }; # too benevolent
47 dontaudit vpp_t self:capability2 block_suspend;
48 allow vpp_t self:process { execmem execstack setsched signal }; # too benevolent
49 allow vpp_t self:packet_socket { bind create setopt ioctl };
50 allow vpp_t self:tun_socket { create relabelto relabelfrom };
51 allow vpp_t self:udp_socket { create ioctl };
52 allow vpp_t self:unix_dgram_socket { connect create ioctl };
53 allow vpp_t self:unix_stream_socket { create_stream_socket_perms connectto };
55 manage_dirs_pattern(vpp_t, vpp_lib_t, vpp_lib_t)
56 manage_files_pattern(vpp_t, vpp_lib_t, vpp_lib_t)
57 allow vpp_t vpp_lib_t:file execute;
58 files_var_lib_filetrans(vpp_t, vpp_lib_t, {file dir})
60 manage_dirs_pattern(vpp_t, vpp_log_t, vpp_log_t)
61 manage_files_pattern(vpp_t, vpp_log_t, vpp_log_t)
62 logging_log_filetrans(vpp_t, vpp_log_t, {file dir})
64 manage_dirs_pattern(vpp_t, vpp_var_run_t, vpp_var_run_t)
65 manage_files_pattern(vpp_t, vpp_var_run_t, vpp_var_run_t)
66 manage_sock_files_pattern(vpp_t, vpp_var_run_t, vpp_var_run_t)
67 allow vpp_t vpp_var_run_t:dir mounton;
68 files_pid_filetrans(vpp_t, vpp_var_run_t, { dir sock_file file })
70 manage_dirs_pattern(vpp_t, vpp_tmp_t, vpp_tmp_t)
71 manage_files_pattern(vpp_t, vpp_tmp_t, vpp_tmp_t)
72 manage_sock_files_pattern(vpp_t, vpp_tmp_t, vpp_tmp_t)
73 allow vpp_t vpp_tmp_t:dir mounton;
74 files_tmp_filetrans(vpp_t, vpp_tmp_t, { dir sock_file file })
76 manage_dirs_pattern(vpp_t, vpp_tmpfs_t, vpp_tmpfs_t)
77 manage_files_pattern(vpp_t, vpp_tmpfs_t, vpp_tmpfs_t)
78 fs_tmpfs_filetrans(vpp_t, vpp_tmpfs_t, { dir file })
80 read_files_pattern(vpp_t, vpp_config_rw_t, vpp_config_rw_t)
82 kernel_read_system_state(vpp_t)
83 kernel_read_network_state(vpp_t)
84 kernel_dgram_send(vpp_t)
85 kernel_request_load_module(vpp_t)
87 auth_read_passwd(vpp_t)
89 corenet_rw_tun_tap_dev(vpp_t)
91 dev_rw_userio_dev(vpp_t)
94 dev_rw_vfio_dev(vpp_t)
96 domain_obj_id_change_exemption(vpp_t)
98 fs_manage_hugetlbfs_dirs(vpp_t)
99 fs_manage_hugetlbfs_files(vpp_t)
100 allow vpp_t hugetlbfs_t:filesystem { getattr mount unmount };
101 fs_getattr_tmpfs(vpp_t)
103 logging_send_syslog_msg(vpp_t)
105 miscfiles_read_generic_certs(vpp_t)
107 userdom_list_user_home_content(vpp_t)
110 virt_stream_connect_svirt(vpp_t)
114 unconfined_attach_tun_iface(vpp_t)
118 ########################################
120 # svirt local policy for vpp
123 allow svirt_t vpp_t:unix_stream_socket connectto;
125 manage_dirs_pattern(svirt_t, vpp_var_run_t, vpp_var_run_t)
126 manage_files_pattern(svirt_t, vpp_var_run_t, vpp_var_run_t)
127 manage_sock_files_pattern(svirt_t, vpp_var_run_t, vpp_var_run_t)
129 allow vpp_t svirt_image_t:file { read write };
132 ########################################
134 # systemd_sysctl_t local policy for vpp
137 read_files_pattern(systemd_sysctl_t, vpp_config_rw_t, vpp_config_rw_t)