blob: 0371e1462b0c0610ba1b4c7a99167b86a7bc114f [file] [log] [blame]
Lorenzo Colittiab7dfab2013-08-05 15:32:56 +09001# 464xlat daemon
2type clatd, domain;
Lorenzo Colittiab7dfab2013-08-05 15:32:56 +09003type clatd_exec, exec_type, file_type;
4
Lorenzo Colittiab7dfab2013-08-05 15:32:56 +09005net_domain(clatd)
Stephen Smalleya770ee52014-02-21 11:08:15 -05006
7# Access objects inherited from netd.
8allow clatd netd:fd use;
9allow clatd netd:fifo_file { read write };
Stephen Smalleye42cebe2014-03-14 08:22:19 -040010# TODO: Check whether some or all of these sockets should be close-on-exec.
Stephen Smalleya770ee52014-02-21 11:08:15 -050011allow clatd netd:netlink_kobject_uevent_socket { read write };
12allow clatd netd:netlink_nflog_socket { read write };
13allow clatd netd:netlink_route_socket { read write };
14allow clatd netd:udp_socket { read write };
15allow clatd netd:unix_stream_socket { read write };
Stephen Smalleye42cebe2014-03-14 08:22:19 -040016allow clatd netd:unix_dgram_socket { read write };
Stephen Smalleya770ee52014-02-21 11:08:15 -050017
Lorenzo Colitti6cd57a42014-06-05 23:30:08 +090018allow clatd self:capability { net_admin net_raw setuid setgid };
Stephen Smalleya770ee52014-02-21 11:08:15 -050019
Stephen Smalley16011322014-02-24 15:06:11 -050020allow clatd self:netlink_route_socket nlmsg_write;
Lorenzo Colitti6cd57a42014-06-05 23:30:08 +090021allow clatd self:{ packet_socket rawip_socket tun_socket } create_socket_perms;
Stephen Smalleya770ee52014-02-21 11:08:15 -050022allow clatd tun_device:chr_file rw_file_perms;