policy_module(vde, 0.0.1) ######################################## # # Declarations # type vde_t; type vde_exec_t; init_daemon_domain(vde_t, vde_exec_t) type vde_initrc_exec_t; init_script_file(vde_initrc_exec_t) type vde_var_lib_t; files_type(vde_var_lib_t) type vde_runtime_t alias vde_var_run_t; files_runtime_file(vde_runtime_t) type vde_tmp_t; files_tmp_file(vde_tmp_t) ######################################## # # Local policy # allow vde_t self:process { signal_perms getcap setcap }; allow vde_t self:capability { chown net_admin dac_override fowner fsetid }; allow vde_t vde_tmp_t:sock_file manage_sock_file_perms; allow vde_t self:unix_stream_socket { create_stream_socket_perms connectto }; allow vde_t self:unix_dgram_socket create_socket_perms; files_tmp_filetrans(vde_t, vde_tmp_t, sock_file) manage_dirs_pattern(vde_t, vde_runtime_t, vde_runtime_t) manage_files_pattern(vde_t, vde_runtime_t, vde_runtime_t) manage_sock_files_pattern(vde_t, vde_runtime_t, vde_runtime_t) files_runtime_filetrans(vde_t, vde_runtime_t, { dir file sock_file unix_dgram_socket }) files_read_etc_files(vde_t) domain_use_interactive_fds(vde_t) userdom_use_user_terminals(vde_t) miscfiles_read_localization(vde_t) corenet_rw_tun_tap_dev(vde_t) logging_send_syslog_msg(vde_t) optional_policy(` qemu_rw_pid_sock_files(vde_t) ')