Skip to content
Snippets Groups Projects
Commit 72b26547 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by Jeffrey Vander Stoep
Browse files

domain_deprecated: remove cgroup access

Logs indicate that all processes that require read access
have already been granted it.

Bug: 28760354
Test: build policy
Merged-In: I5826c45f54af32e3d4296df904c8523bb5df5e62
Change-Id: I5826c45f54af32e3d4296df904c8523bb5df5e62
parent 790f4c7e
No related branches found
No related tags found
No related merge requests found
...@@ -122,7 +122,6 @@ auditallow { ...@@ -122,7 +122,6 @@ auditallow {
# Read access to pseudo filesystems. # Read access to pseudo filesystems.
r_dir_file(domain_deprecated, proc) r_dir_file(domain_deprecated, proc)
r_dir_file(domain_deprecated, sysfs) r_dir_file(domain_deprecated, sysfs)
r_dir_file(domain_deprecated, cgroup)
userdebug_or_eng(` userdebug_or_eng(`
auditallow { auditallow {
...@@ -185,32 +184,4 @@ auditallow { ...@@ -185,32 +184,4 @@ auditallow {
-ueventd -ueventd
-vold -vold
} sysfs:lnk_file { getattr open ioctl lock }; # read granted in domain } sysfs:lnk_file { getattr open ioctl lock }; # read granted in domain
auditallow {
domain_deprecated
-appdomain
-fingerprintd
-healthd
-inputflinger
-installd
-keystore
-netd
-rild
-surfaceflinger
-system_server
-zygote
} cgroup:dir r_dir_perms;
auditallow {
domain_deprecated
-appdomain
-fingerprintd
-healthd
-inputflinger
-installd
-keystore
-netd
-rild
-surfaceflinger
-system_server
-zygote
} cgroup:{ file lnk_file } r_file_perms;
') ')
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment