Skip to content
Snippets Groups Projects
Commit fad0b04d authored by Chenbo Feng's avatar Chenbo Feng
Browse files

Remove app access to qtaguid ctrl/stats file

Remove the untrusted apps and priviledged apps from the group that can
directly access xt_qtaguid module related file. All apps that need to
access app network usage data need to use the public API provided in
framework.

Test: Flashed with master branch on marlin, verified phone boot, can
      browse web, watch youtube video, make phone call and use google
      map for navigation with either wifi is on or off.
      run cts -m CtsNetTestCases -t android.net.cts.TrafficStatsTest
      run cts -m CtsNativeNetTestCases
Bug: 68774956 30950746

Change-Id: I9b3db819d6622611d5b512ef821abb4c28d6c9eb
parent 715c3a78
No related branches found
No related tags found
No related merge requests found
...@@ -169,15 +169,7 @@ userdebug_or_eng(` ...@@ -169,15 +169,7 @@ userdebug_or_eng(`
allow appdomain heapdump_data_file:file append; allow appdomain heapdump_data_file:file append;
') ')
# Write to /proc/net/xt_qtaguid/ctrl file.
allow appdomain qtaguid_proc:file rw_file_perms;
r_dir_file({ appdomain -ephemeral_app -isolated_app }, proc_net) r_dir_file({ appdomain -ephemeral_app -isolated_app }, proc_net)
# read /proc/net/xt_qtguid/*stat* to per-app network data usage.
# Exclude isolated app which may not use network sockets.
r_dir_file({ appdomain -isolated_app }, proc_qtaguid_stat)
# Everybody can read the xt_qtaguid resource tracking misc dev.
# So allow all apps to read from /dev/xt_qtaguid.
allow { appdomain -isolated_app } qtaguid_device:chr_file r_file_perms;
# Grant GPU access to all processes started by Zygote. # Grant GPU access to all processes started by Zygote.
# They need that to render the standard UI. # They need that to render the standard UI.
...@@ -550,3 +542,8 @@ neverallow appdomain proc_uid_concurrent_policy_time:file *; ...@@ -550,3 +542,8 @@ neverallow appdomain proc_uid_concurrent_policy_time:file *;
# Apps cannot access proc_uid_cpupower # Apps cannot access proc_uid_cpupower
neverallow appdomain proc_uid_cpupower:file *; neverallow appdomain proc_uid_cpupower:file *;
# Apps cannot access proc/net/xt_qtaguid/ files anymore since P.
neverallow { appdomain -shell } qtaguid_proc:file rw_file_perms;
neverallow { appdomain -shell } proc_qtaguid_stat:{ file lnk_file } r_file_perms;
neverallow { appdomain -shell } qtaguid_device:chr_file r_file_perms;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment