coredump tool needs to expose system and vendor image
fingerprint to know the relative version info.
MTK-Commit-Id: bb82be1edc85daa3838c5917597d1c25e57bc434
Change-Id: Id29698199ac9081c56ad51f244b75732c9e18894
CR-Id: ALPS04767749
Feature: Android Exception Engine(AEE)
power-hal would be killed and re-start in the manual encryption flow.
To prevenet the second power-hal would be stuck by other service,
clear the vendor.powerhal.init property.
MTK-Commit-Id: 0ec23aea4fa637f6e1e22a45c9afb914c48d20d8
Change-Id: Idaf2ad7b01337ce94afe507395588e299fb9cb8a
CR-Id: ALPS04795693
Feature: Full Disk Encryption (FDE)
[Detail] Hybrid encoder would use /proc/m4u device that we have to enable its access permission.
MTK-Commit-Id: ba554f2ef0c5e78a7f9df483453b04630c557391
Change-Id: I93d40947a40da9d17d63cb0ad79519837b64e643
CR-Id: ALPS04807382
Feature: H.264 Encoder
[Detail] Hybrid encoder would use /proc/m4u device that we have to enable its access permission.
MTK-Commit-Id: 95d62cfe0a8c3c5f1b5992717c93872edf435668
Change-Id: I65cc0b24892afaba20a8433e548b05f005078a19
CR-Id: ALPS04807382
Feature: H.264 Encoder
This effectively disables LD_PRELOAD for init children and breaks
loading of libdirect-coredump. This, however, is needed to avoid
layering violation and is the right thing to do long term.
MTK-Commit-Id: dafd04d1c1bbf0dae863774bfbd2c76cfecb2d98
Bug: 140789528
Test: Boot with boringssl_self_test32 enabled.
Change-Id: Id10c673694431dfae2fff401598e808a71e397ca
CR-Id: ALPS04767749
Feature: Android Exception Engine(AEE)
[Detail]
EAS cannot control CPU freq
[Solution]
Add proc_cpufreq in vendor_init.te
MTK-Commit-Id: 69955d988abbc3ba90ebefdb734212a9ff1e4e19
Change-Id: Id749e5d60bfa29a4b4c131557981b69eed7d5077
CR-Id: ALPS04802193
Feature: Energy Aware Scheduling Plus (EAS+)
[Detail]
Modify sepolicy of emhidl from nvdata to nvcfg
for MCF to access nvcfg
MTK-Commit-Id: 1027f0b3abdbca6457c0a20af765d063ea2f9a78
Change-Id: I95bde16e2910fb37d2f9ffc5a0f29f8fb618ec64
CR-Id: ALPS04359407
Feature: Engineering Mode
1. Dont create folder in data by process self
MTK-Commit-Id: 137bc58be1b0069794c7b52db91f8532e406bf31
Change-Id: I20c0ca16c66490b81a03192eb642131b50933933
CR-Id: ALPS04760404
Feature: Modem Log Tool
Android Q and R have different policy in basic.
We sync it from Q policy and fix R neverallow rule
MTK-Commit-Id: 67144e1e0efe28d30381b1f3a98728c1a87e396e
Change-Id: Id7c92fa79976951c86d1286262f684e8f747427b
CR-Id: ALPS04793867
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
Remove SE policy which is used by powerhal
MTK-Commit-Id: 08a121d90319599509142fb1b76a8bae7d287b6b
Change-Id: Idfca0859f22e880ff9ec6d55db315911438f9e53
CR-Id: ALPS04760857
Feature: [Module]PowerHAL
Change block device path so that access from user space
need not take care platform-dependent device address.
MTK-Commit-Id: 0c06dba2f545b1ecbf614f6fab0f8f9faef7199a
Change-Id: I68746d22e61259a9bcdbf4124446b9c81077edbe
Signed-off-by: Vineet Goyal <vineet.goyal@mediatek.com>
CR-Id: ALPS04793667
Feature: eMMC Boot Up
[Detail]
Add ioctl define for permissioin control
if user need to add m4u permission,
need to add it in its process .te file
MTK-Commit-Id: 450b6a3cf6177d0befee4dbe3e41104c8e957191
Change-Id: If708b999fd398a2388cdf7fc764d91814a9bbf86
Signed-off-by: Cui Zhang <cui.zhang@mediatek.com>
CR-Id: ALPS04791203
Feature: [Module]ION/M4U
When clear eMMC, need umount bootfs, add permission to stop
mdlogger process which access bootfs.
MTK-Commit-Id: 9ebab1fae0665a8c08af9b2d59b52a40f570054b
Change-Id: If4a9667906698b812a45b17d1162df3db3ed61f3
CR-Id: ALPS04786311
Feature: Factory Mode
When clear eMMC, need umount bootfs, add permission to stop
mdlogger process which access bootfs.
MTK-Commit-Id: 2d39dc0341e703f5ae92797146c0d2cec8defe77
Change-Id: I32bb7e94db970361a9f3a345f0cf7541fc9fd634
CR-Id: ALPS04786311
Feature: Factory Mode
in ppp.te, some property is set for pppoe, since pppoe feature
is phased out, just remove related sepolicy rules
MTK-Commit-Id: 0c0b761b1dc65ddf5375d62ff5ed13d9df6a0e4c
Change-Id: I063224db045b9e57e2b2ad8e8f36ff1ff2b46f18
CR-Id: ALPS04763235
Feature: [Module]IP Networking
ICCID belongs to sensitive information and is not allowed to print.
Add IMSI property to sensitive group and it is not printed in
mtklogger property files.
MTK-Commit-Id: 9a8e54973852a5afc01083ffe6ef2b7ac91d9347
Change-Id: I6e8a799bc5299deca730add0d0dfee77550b2a63
CR-Id: ALPS04785930
Feature: Mobile Data Service
Add permission to save logs to special folder
MTK-Commit-Id: 51c58a7b5b66247b1ab454f71e6cc721ff83f61f
Change-Id: I00b58af1ae46842c84f183c2154583e59e98199b
CR-Id: ALPS04727197
Feature: Modem Log Tool
[Detail]
Wcn coredump move to vendor on Android Q. EM need to set property by
vendor hidl
MTK-Commit-Id: 7b93a89746c7d9f5c2672418babb22c9a23513b0
Change-Id: I9ff4d54918c9becab9dcaaae9f5cbb3d04d17ac6
CR-Id: ALPS04316338
Feature: Engineering Mode
Add hal_graphics_allocator_default SELinux sepolicy to
enable normal/secure world communication.
This is used for secure memory allocation from graphics allocator HAL
to TEEI OS.
MTK-Commit-Id: a47f2e49b8c563fdc457443e46af591a2691a441
Change-Id: I2bdc87303310f5acdd85f0491e58644b26963838
CR-Id: ALPS04784782
Feature: Microtrust TEEI
Remove the high risk sepolicy sysfs_vcorefs_pwrctrl because its no
longer in use.
MTK-Commit-Id: 7aec1b3e31558366c3d3f098eb7c9eac02398a2a
Change-Id: I2e0dcd99be464f01435f8e96ea6dd5fa6ca12716
CR-Id: ALPS04763239
Feature: SIM