diff --git a/private/app.te b/private/app.te index 3c6e5d02d..3f838a6b9 100644 --- a/private/app.te +++ b/private/app.te @@ -176,7 +176,6 @@ allow { appdomain -isolated_app_all -ephemeral_app -sdk_sandbox_all } usbaccesso control_logd({ appdomain -isolated_app_all -ephemeral_app -sdk_sandbox_all }) # application inherit logd write socket (urge is to deprecate this long term) -allow { appdomain -isolated_app_all -ephemeral_app -sdk_sandbox_all } keystore:keystore_key { get_state get insert delete exist list sign verify }; allow { appdomain -isolated_app_all -ephemeral_app -sdk_sandbox_all } keystore:keystore2_key { delete use get_info rebind update }; allow { appdomain -isolated_app_all -ephemeral_app -sdk_sandbox_all } keystore_maintenance_service:service_manager find; diff --git a/private/binderservicedomain.te b/private/binderservicedomain.te index 21349df17..62be63c1e 100644 --- a/private/binderservicedomain.te +++ b/private/binderservicedomain.te @@ -18,7 +18,6 @@ allow binderservicedomain appdomain:fifo_file write; # allow all services to run permission checks allow binderservicedomain permission_service:service_manager find; -allow binderservicedomain keystore:keystore_key { get_state get insert delete exist list sign verify }; allow binderservicedomain keystore:keystore2 { get_state }; allow binderservicedomain keystore:keystore2_key { delete get_info rebind use }; diff --git a/private/domain.te b/private/domain.te index 1ecb7b6d7..0861fa50e 100644 --- a/private/domain.te +++ b/private/domain.te @@ -214,7 +214,6 @@ neverallow { } self:global_capability_class_set sys_ptrace; # Limit ability to generate hardware unique device ID attestations to priv_apps -neverallow { domain -priv_app -gmscore_app } *:keystore_key gen_unique_id; neverallow { domain -priv_app -gmscore_app } *:keystore2_key gen_unique_id; neverallow { domain -system_server } *:keystore2_key use_dev_id; neverallow { domain -system_server } keystore:keystore2 { clear_ns lock reset unlock }; diff --git a/private/gmscore_app.te b/private/gmscore_app.te index b662f4fe5..859c2ec67 100644 --- a/private/gmscore_app.te +++ b/private/gmscore_app.te @@ -36,7 +36,6 @@ allow gmscore_app perfetto:fd use; allow gmscore_app perfetto_traces_data_file:file { read getattr }; # Allow GMS core to generate unique hardware IDs -allow gmscore_app keystore:keystore_key gen_unique_id; allow gmscore_app keystore:keystore2_key gen_unique_id; # Allow GMS core to access /sys/fs/selinux/policyvers for compatibility check diff --git a/private/keystore.te b/private/keystore.te index cd2ef76d5..73961ac06 100644 --- a/private/keystore.te +++ b/private/keystore.te @@ -26,7 +26,7 @@ get_prop(keystore, device_config_remote_key_provisioning_native_prop) # Allow keystore to write to statsd. unix_socket_send(keystore, statsdw, statsd) -# Keystore need access to the keystore_key context files to load the keystore key backend. +# Keystore need access to the keystore2_key_contexts file to load the keystore key backend. allow keystore keystore2_key_contexts_file:file r_file_perms; # Allow keystore to listen to changing boot levels diff --git a/private/keystore2_key_contexts b/private/keystore2_key_contexts index 3833971fc..868bf15e4 100644 --- a/private/keystore2_key_contexts +++ b/private/keystore2_key_contexts @@ -4,10 +4,10 @@ #