Skip to content
Snippets Groups Projects
Commit f3220aa6 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep Committed by Jeffrey Vander Stoep
Browse files

Remove direct qtaguid access from platform/system apps

System components should use the public tagSocket() API, not direct
file access to /proc/net/xt_qtaguid/* and /dev/xt_qtaguid.

Test: build/boot taimen-userdebug. Use youtube, browse chrome,
    navigate maps on both cellular and wifi.
Bug: 68774956

Change-Id: Id895395de100d8f9a09886aceb0d6061fef832ef
parent 9d28625f
No related branches found
No related tags found
No related merge requests found
......@@ -181,8 +181,6 @@ allow {
untrusted_app_27
ephemeral_app
priv_app
system_app
platform_app
} proc_qtaguid_ctrl:file rw_file_perms;
# read /proc/net/xt_qtguid/*stat* to per-app network data usage.
# Exclude isolated app which may not use network sockets.
......@@ -191,8 +189,6 @@ r_dir_file({
untrusted_app_27
ephemeral_app
priv_app
system_app
platform_app
}, proc_qtaguid_stat)
# Everybody can read the xt_qtaguid resource tracking misc dev.
# So allow all apps to read from /dev/xt_qtaguid.
......@@ -201,8 +197,6 @@ allow {
untrusted_app_27
ephemeral_app
priv_app
system_app
platform_app
} qtaguid_device:chr_file r_file_perms;
# Grant GPU access to all processes started by Zygote.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment