Skip to content
Snippets Groups Projects
Commit 186466e9 authored by Nick Kralevich's avatar Nick Kralevich
Browse files

move cgroup auditallow into userdebug_or_eng block

By convention, auditallow statements are typically put into
userdebug_or_eng blocks, to ensure we don't accidentally ship
unnecessary audit rules. Let's do the same here.

Test: policy compiles.
Change-Id: Ib3eac94284eea3c1ae2f3dacddcb2eaeca95230e
parent 25b4eb21
No related branches found
No related tags found
No related merge requests found
...@@ -277,15 +277,19 @@ allow { ...@@ -277,15 +277,19 @@ allow {
-untrusted_app_all -untrusted_app_all
-priv_app -priv_app
} cgroup:file w_file_perms; } cgroup:file w_file_perms;
auditallow appdomain cgroup:file w_file_perms; userdebug_or_eng(`
auditallow appdomain cgroup:file w_file_perms;
')
# TODO(b/110043362): Clean up cgroup access from non-system domains. # TODO(b/110043362): Clean up cgroup access from non-system domains.
allow { domain -coredomain } cgroup:file w_file_perms; allow { domain -coredomain } cgroup:file w_file_perms;
auditallow { userdebug_or_eng(`
domain auditallow {
-coredomain domain
-vendor_init -coredomain
} cgroup:file w_file_perms; -vendor_init
} cgroup:file w_file_perms;
')
# Almost all processes log tracing information to # Almost all processes log tracing information to
# /sys/kernel/debug/tracing/trace_marker # /sys/kernel/debug/tracing/trace_marker
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment