diff --git a/policy/flask/access_vectors b/policy/flask/access_vectors index 4f57fb404..0630f012a 100644 --- a/policy/flask/access_vectors +++ b/policy/flask/access_vectors @@ -1081,3 +1081,12 @@ inherits socket class smc_socket inherits socket + +class bpf +{ + map_create + map_read + map_write + prog_load + prog_run +} diff --git a/policy/flask/security_classes b/policy/flask/security_classes index 3ff1b72d2..2ae343060 100644 --- a/policy/flask/security_classes +++ b/policy/flask/security_classes @@ -190,4 +190,6 @@ class smc_socket class process2 +class bpf + # FLASK diff --git a/policy/modules/system/init.te b/policy/modules/system/init.te index 057c33e87..bd5620457 100644 --- a/policy/modules/system/init.te +++ b/policy/modules/system/init.te @@ -228,6 +228,7 @@ ifdef(`init_systemd',` allow init_t self:netlink_route_socket create_netlink_socket_perms; allow init_t initrc_t:unix_dgram_socket create_socket_perms; allow init_t self:capability2 audit_read; + allow init_t self:bpf { map_create map_read map_write prog_load prog_run }; # for /run/systemd/inaccessible/{chr,blk} allow init_t init_var_run_t:blk_file { create getattr };