Lorenzo Colitti | ab7dfab | 2013-08-05 15:32:56 +0900 | [diff] [blame] | 1 | # 464xlat daemon |
| 2 | type clatd, domain; |
Stephen Smalley | f321456 | 2014-02-11 09:45:28 -0500 | [diff] [blame] | 3 | permissive_or_unconfined(clatd) |
Lorenzo Colitti | ab7dfab | 2013-08-05 15:32:56 +0900 | [diff] [blame] | 4 | type clatd_exec, exec_type, file_type; |
| 5 | |
Lorenzo Colitti | ab7dfab | 2013-08-05 15:32:56 +0900 | [diff] [blame] | 6 | net_domain(clatd) |
Stephen Smalley | a770ee5 | 2014-02-21 11:08:15 -0500 | [diff] [blame] | 7 | |
| 8 | # Access objects inherited from netd. |
| 9 | allow clatd netd:fd use; |
| 10 | allow clatd netd:fifo_file { read write }; |
| 11 | allow clatd netd:netlink_kobject_uevent_socket { read write }; |
| 12 | allow clatd netd:netlink_nflog_socket { read write }; |
| 13 | allow clatd netd:netlink_route_socket { read write }; |
| 14 | allow clatd netd:udp_socket { read write }; |
| 15 | allow clatd netd:unix_stream_socket { read write }; |
| 16 | |
| 17 | allow clatd self:capability { net_admin setuid setgid }; |
| 18 | |
| 19 | # TODO: Run clatd in vpn group to avoid need for this on /dev/tun. |
| 20 | allow clatd self:capability dac_override; |
| 21 | |
| 22 | allow clatd self:netlink_route_socket { create_socket_perms nlmsg_write }; |
| 23 | allow clatd self:tun_socket create_socket_perms; |
| 24 | allow clatd tun_device:chr_file rw_file_perms; |
| 25 | allow clatd proc_net:file rw_file_perms;; |