dontaudit clatd self:capability ipc_lock
clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks capable(CAP_IPC_LOCK), and then checks to see the requested amount is under RLIMIT_MEMLOCK. The latter check succeeds. As a result, clatd does not need CAP_IPC_LOCK, so we suppress any denials we see from clatd asking for this capability. See https://android-review.googlesource.com/127940 Suppresses the following denial: type=1400 audit(1424916750.163:7): avc: denied { ipc_lock } for pid=3458 comm="clatd" capability=14 scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=capability Change-Id: Ica108f66010dfc6a5431efa0b4e58f6a784672d1
This commit is contained in:
parent
d99ea5a8af
commit
b4c4424c99
1 changed files with 8 additions and 0 deletions
8
clatd.te
8
clatd.te
|
@ -17,6 +17,14 @@ allow clatd netd:unix_dgram_socket { read write };
|
|||
|
||||
allow clatd self:capability { net_admin net_raw setuid setgid };
|
||||
|
||||
# clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks
|
||||
# capable(CAP_IPC_LOCK), and then checks to see the requested amount is
|
||||
# under RLIMIT_MEMLOCK. The latter check succeeds. As a result, clatd
|
||||
# does not need CAP_IPC_LOCK, so we suppress any denials we see
|
||||
# from clatd asking for this capability.
|
||||
# See https://android-review.googlesource.com/127940
|
||||
dontaudit clatd self:capability ipc_lock;
|
||||
|
||||
allow clatd self:netlink_route_socket nlmsg_write;
|
||||
allow clatd self:{ packet_socket rawip_socket tun_socket } create_socket_perms;
|
||||
allow clatd tun_device:chr_file rw_file_perms;
|
||||
|
|
Loading…
Reference in a new issue