Skip to content
Snippets Groups Projects
Commit 8afb47e3 authored by Nick Kralevich's avatar Nick Kralevich Committed by Android Git Automerger
Browse files

am f692ee94: am 2a36dff6: Merge "Address SELinux denials with clatd."

* commit 'f692ee94':
  Address SELinux denials with clatd.
parents e033cd6f f692ee94
No related branches found
No related tags found
No related merge requests found
...@@ -3,5 +3,23 @@ type clatd, domain; ...@@ -3,5 +3,23 @@ type clatd, domain;
permissive_or_unconfined(clatd) permissive_or_unconfined(clatd)
type clatd_exec, exec_type, file_type; type clatd_exec, exec_type, file_type;
init_daemon_domain(clatd)
net_domain(clatd) net_domain(clatd)
# Access objects inherited from netd.
allow clatd netd:fd use;
allow clatd netd:fifo_file { read write };
allow clatd netd:netlink_kobject_uevent_socket { read write };
allow clatd netd:netlink_nflog_socket { read write };
allow clatd netd:netlink_route_socket { read write };
allow clatd netd:udp_socket { read write };
allow clatd netd:unix_stream_socket { read write };
allow clatd self:capability { net_admin setuid setgid };
# TODO: Run clatd in vpn group to avoid need for this on /dev/tun.
allow clatd self:capability dac_override;
allow clatd self:netlink_route_socket { create_socket_perms nlmsg_write };
allow clatd self:tun_socket create_socket_perms;
allow clatd tun_device:chr_file rw_file_perms;
allow clatd proc_net:file rw_file_perms;;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment