mirror of
https://github.com/openvswitch/ovs
synced 2025-10-29 15:28:56 +00:00
A last-minute change to the selinux policy caught by testing
incorrectly omitted moving a definition from non-dpdk to dpdk.
This moves the chr_file definition to a non-dpdk enabled permission,
which should allow non-dpdk enabled builds to work.
Fixes: 84d2723305 ("selinux: update policy to reflect non-root and dpdk support")
Signed-off-by: Aaron Conole <aconole@redhat.com>
Acked-by: Ansis Atteka <aatteka@ovn.org>
55 lines
2.5 KiB
Plaintext
55 lines
2.5 KiB
Plaintext
module openvswitch-custom 1.0.1;
|
|
|
|
require {
|
|
type openvswitch_t;
|
|
type openvswitch_rw_t;
|
|
type openvswitch_tmp_t;
|
|
type openvswitch_var_run_t;
|
|
|
|
type ifconfig_exec_t;
|
|
type hostname_exec_t;
|
|
type tun_tap_device_t;
|
|
|
|
@begin_dpdk@
|
|
type hugetlbfs_t;
|
|
type kernel_t;
|
|
type svirt_image_t;
|
|
type vfio_device_t;
|
|
@end_dpdk@
|
|
|
|
class capability { dac_override audit_write };
|
|
class chr_file { write getattr read open ioctl };
|
|
class dir { write remove_name add_name lock read };
|
|
class file { write getattr read open execute execute_no_trans create unlink };
|
|
class netlink_audit_socket { create nlmsg_relay audit_write read write };
|
|
class netlink_socket { setopt getopt create connect getattr write read };
|
|
class unix_stream_socket { write getattr read connectto connect setopt getopt sendto accept bind recvfrom acceptfrom };
|
|
|
|
@begin_dpdk@
|
|
class tun_socket { relabelfrom relabelto create };
|
|
@end_dpdk@
|
|
}
|
|
|
|
#============= openvswitch_t ==============
|
|
allow openvswitch_t self:capability { dac_override audit_write };
|
|
allow openvswitch_t self:netlink_audit_socket { create nlmsg_relay audit_write read write };
|
|
allow openvswitch_t self:netlink_socket { setopt getopt create connect getattr write read };
|
|
|
|
allow openvswitch_t hostname_exec_t:file { read getattr open execute execute_no_trans };
|
|
allow openvswitch_t ifconfig_exec_t:file { read getattr open execute execute_no_trans };
|
|
|
|
allow openvswitch_t openvswitch_rw_t:dir { write remove_name add_name lock read };
|
|
allow openvswitch_t openvswitch_rw_t:file { write getattr read open execute execute_no_trans create unlink };
|
|
allow openvswitch_t openvswitch_tmp_t:file { execute execute_no_trans };
|
|
allow openvswitch_t openvswitch_tmp_t:unix_stream_socket { write getattr read connectto connect setopt getopt sendto accept bind recvfrom acceptfrom };
|
|
allow openvswitch_t tun_tap_device_t:chr_file { read write getattr open ioctl };
|
|
|
|
@begin_dpdk@
|
|
allow openvswitch_t hugetlbfs_t:dir { write remove_name add_name lock read };
|
|
allow openvswitch_t hugetlbfs_t:file { create unlink };
|
|
allow openvswitch_t kernel_t:unix_stream_socket { write getattr read connectto connect setopt getopt sendto accept bind recvfrom acceptfrom };
|
|
allow openvswitch_t self:tun_socket { relabelfrom relabelto create };
|
|
allow openvswitch_t svirt_image_t:file { getattr read write };
|
|
allow openvswitch_t vfio_device_t:chr_file { read write open ioctl getattr };
|
|
@end_dpdk@
|