Skip to content
Snippets Groups Projects
Commit 3ee85ca6 authored by Paul Lawrence's avatar Paul Lawrence
Browse files

Revert "Securely encrypt the master key"

This reverts commit 5287d9a8.

Change-Id: I9ec0db0718da7088dc2b66f5b1749b8fb069575a
parent 5287d9a8
No related branches found
No related tags found
No related merge requests found
...@@ -93,7 +93,6 @@ allow domain urandom_device:chr_file rw_file_perms; ...@@ -93,7 +93,6 @@ allow domain urandom_device:chr_file rw_file_perms;
allow domain random_device:chr_file rw_file_perms; allow domain random_device:chr_file rw_file_perms;
allow domain properties_device:file r_file_perms; allow domain properties_device:file r_file_perms;
allow domain init:key search; allow domain init:key search;
allow domain vold:key search;
# logd access # logd access
write_logd(domain) write_logd(domain)
......
...@@ -257,7 +257,11 @@ allow init pstorefs:file r_file_perms; ...@@ -257,7 +257,11 @@ allow init pstorefs:file r_file_perms;
# linux keyring configuration # linux keyring configuration
allow init init:key { write search setattr }; allow init init:key { write search setattr };
# Allow init to create /data/unencrypted # Allow init to link temp fs to unencrypted data on userdata
allow init tmpfs:lnk_file { create read getattr relabelfrom };
# Allow init to manipulate /data/unencrypted
allow init unencrypted_data_file:{ file lnk_file } create_file_perms;
allow init unencrypted_data_file:dir create_dir_perms; allow init unencrypted_data_file:dir create_dir_perms;
unix_socket_connect(init, vold, vold) unix_socket_connect(init, vold, vold)
......
...@@ -143,18 +143,14 @@ allow vold userdata_block_device:blk_file rw_file_perms; ...@@ -143,18 +143,14 @@ allow vold userdata_block_device:blk_file rw_file_perms;
# Access metadata block device used for encryption meta-data. # Access metadata block device used for encryption meta-data.
allow vold metadata_block_device:blk_file rw_file_perms; allow vold metadata_block_device:blk_file rw_file_perms;
# Allow vold to manipulate /data/unencrypted # Allow init to manipulate /data/unencrypted
allow vold unencrypted_data_file:{ file } create_file_perms; allow vold unencrypted_data_file:{ file lnk_file } create_file_perms;
allow vold unencrypted_data_file:dir create_dir_perms; allow vold unencrypted_data_file:dir create_dir_perms;
# Give vold a place where only vold can store files; everyone else is off limits # Give vold a place where only vold can store files; everyone else is off limits
allow vold vold_data_file:dir rw_dir_perms; allow vold vold_data_file:dir rw_dir_perms;
allow vold vold_data_file:file create_file_perms; allow vold vold_data_file:file create_file_perms;
# linux keyring configuration
allow vold init:key { write search setattr };
allow vold vold:key { write search setattr };
neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto }; neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto };
neverallow { domain -vold } vold_data_file:notdevfile_class_set ~{ relabelto getattr }; neverallow { domain -vold } vold_data_file:notdevfile_class_set ~{ relabelto getattr };
neverallow { domain -vold -init } vold_data_file:dir *; neverallow { domain -vold -init } vold_data_file:dir *;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment