From b4c4424c99dcb5aace69f3bc5593635e045fb519 Mon Sep 17 00:00:00 2001 From: Nick Kralevich Date: Thu, 26 Feb 2015 16:49:15 -0800 Subject: [PATCH] dontaudit clatd self:capability ipc_lock clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks capable(CAP_IPC_LOCK), and then checks to see the requested amount is under RLIMIT_MEMLOCK. The latter check succeeds. As a result, clatd does not need CAP_IPC_LOCK, so we suppress any denials we see from clatd asking for this capability. See https://android-review.googlesource.com/127940 Suppresses the following denial: type=1400 audit(1424916750.163:7): avc: denied { ipc_lock } for pid=3458 comm="clatd" capability=14 scontext=u:r:clatd:s0 tcontext=u:r:clatd:s0 tclass=capability Change-Id: Ica108f66010dfc6a5431efa0b4e58f6a784672d1 --- clatd.te | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/clatd.te b/clatd.te index 0371e1462..5c52bdbdf 100644 --- a/clatd.te +++ b/clatd.te @@ -17,6 +17,14 @@ allow clatd netd:unix_dgram_socket { read write }; allow clatd self:capability { net_admin net_raw setuid setgid }; +# clatd calls mmap(MAP_LOCKED) with a 1M buffer. MAP_LOCKED first checks +# capable(CAP_IPC_LOCK), and then checks to see the requested amount is +# under RLIMIT_MEMLOCK. The latter check succeeds. As a result, clatd +# does not need CAP_IPC_LOCK, so we suppress any denials we see +# from clatd asking for this capability. +# See https://android-review.googlesource.com/127940 +dontaudit clatd self:capability ipc_lock; + allow clatd self:netlink_route_socket nlmsg_write; allow clatd self:{ packet_socket rawip_socket tun_socket } create_socket_perms; allow clatd tun_device:chr_file rw_file_perms;