1152 Commits

Author SHA1 Message Date
Aayush Gupta
23c3e00542 non_plat: Label volte_ua binary and grant required permissions
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I3681ff0ed7a1de2499b8d53fd5d355cacff3a33a
2021-01-03 10:55:55 +05:30
Aayush Gupta
c07ec24c97 non_plat: Label bip binary and grant required permissions
- SELinux rules are obtained fro stock SEpolicy

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ie262a1a2a93aabc1cfa6e1cbdadf647058caec31
2021-01-03 10:08:25 +05:30
Aayush Gupta
a76a7cc1d2 non_plat: Label volte_ism_93 and grant required permissions
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I2ca62b8caed4c7b9e6994e4705df492028ed148d
2021-01-03 10:07:32 +05:30
Aayush Gupta
1e1ffa249d non_plat: Label volte_md_status and grant required permissions
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ia41f71d07852bcb357cc26c0cb82d67c53cf19e9
2021-01-03 10:06:17 +05:30
Aayush Gupta
9ef4675f68 non_plat: Allow all domains to search debugfs_ion dir
[   12.536452] .(1)[399:logd.auditd]type=1400 audit(1262323310.848:231): avc: denied { search } for comm="audio@5.0-servi" name="clients" dev="debugfs" ino=3111 scontext=u:r:mtk_hal_audio:s0 tcontext=u:object_r:debugfs_ion:s0 tclass=dir permissive=1
[   59.661176] .(0)[399:logd.auditd]type=1400 audit(1609417550.280:331): avc: denied { search } for comm="RenderThread" name="clients" dev="debugfs" ino=3111 scontext=u:r:system_app:s0 tcontext=u:object_r:debugfs_ion:s0 tclass=dir permissive=1
[   50.275600] .(4)[399:logd.auditd]type=1400 audit(1609417547.748:325): avc: denied { search } for comm="RenderThread" name="clients" dev="debugfs" ino=3111 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:debugfs_ion:s0 tclass=dir permissive=1 app=com.android.launcher3

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ib8c7e944e95851d5ceef42bb3ea88c77c3cc7e0b
2021-01-03 10:04:01 +05:30
Aayush Gupta
066c480209 non_plat: Allow tee to write property_socket's sock_file
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ic45a915de2246db6d2746aa5970ae55012987d5e
2021-01-03 10:03:20 +05:30
Aayush Gupta
901eb61127 non_plat: Label ipsec_mon binary and grant required permissions
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I0bb583b380590ef753fbdd949e92a34f505b6ce1
2020-12-31 23:28:10 +05:30
Aayush Gupta
0f6aa91846 non_plat: Allow mtk_hal_wifi to set wifi version property
Denial observed without this change:
[   19.217624] .(3)[351:init]selinux: avc:  denied  { set } for property=vendor.wlan.firmware.version pid=1389 uid=1010 gid=1010 scontext=u:r:mtk_hal_wifi:s0 tcontext=u:object_r:vendor_wifi_version:s0 tclass=property_service permissive=1\x0a

Test: Boot and notice denial no longer appears

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Id769a2012ff7c53320e8d7a44bc2f49230e2a0e9
2020-12-31 23:01:22 +05:30
Aayush Gupta
22380a4614 non_plat: Label /dev/tee* and grant required perms to domains
/dev/tee* are accessed by domains that interact with TEE and thus
require access to them too.

Test: Boot and observe that denials are not visible in logs anymore

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I7b0944a1063da8561d2928e4110674ce4845ecea
2020-12-30 17:00:34 +05:30
Aayush Gupta
2e08559c2b non_plat: Label /data/vendor/thh and allow tee to manage it
TEE stores its file in /data/vendor/thh/. Allow it required permissions
to do so.

Denials observed without this change:
12-28 16:42:11.556   416   416 I teei_daemon: type=1400 audit(0.0:394): avc: denied { open } for path="/data/vendor/thh/7778c03fc30c4dd0a319ea29643d4d4b." dev="sdc46" ino=2490455 scontext=u:r:tee:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=dir permissive=1

Test: Boot and notice that denials have resolved

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I1a608ebac628c8ce9c35ece1566e049236321a4b
2020-12-30 16:19:22 +05:30
Aayush Gupta
174dc137d1 non_plat: Label /dev/tz_vfs and grant required perms to tee
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I6bb5d9e3f8f3047bfe8285f25b53adadb8b1c1ac
2020-12-30 16:18:38 +05:30
Aayush Gupta
acd62758d9 non_plat: Label /dev/*rpmb* and grant tee permissions to manage it
/dev/*rpmb* devices are accessed by tee. Label it and allow tee required
permissions to manage it.

Denial observed without this change:
[   46.559953] .(2)[399:logd.auditd]type=1400 audit(1609128921.644:391): avc: denied { ioctl } for comm="teei_daemon" path="/dev/rpmb0" dev="tmpfs" ino=17454 ioctlcmd=0x6 scontext=u:r:init:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Test: Boot and observe that denial no longer appears

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I3499e2a3ba177b8e69d8cdbb76939daf3f8bbc7b
2020-12-30 16:18:06 +05:30
Aayush Gupta
03fc01b6f6 non_plat: Label tee_{daemon|loader} as tee_exec
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ibf3ace0d64a18d404d01230ad919af1e27c4e123
2020-12-30 16:16:25 +05:30
Aayush Gupta
5c601a9ada non_plat: Label /dev/ut_keymaster and allow relevant permissions to sources
/dev/ut_keymaster is used by keymaster. Label it and allow relevant permissions
which domains using it (vold, tee and keymaster) requires.

Denial observed without this change:
[   46.666247] .(2)[399:logd.auditd]type=1400 audit(1609128921.744:392): avc: denied { ioctl } for comm="keymaster@3.0-s" path="/dev/ut_keymaster" dev="tmpfs" ino=17464 ioctlcmd=0x5402 scontext=u:r:hal_keymaster_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Test: Boot and notice that denial no longer appears

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Iee0126d637a139397db8857d8a780277c3ea4576
2020-12-30 16:14:46 +05:30
Aayush Gupta
a15f249346 non_plat: Label /dev/teei_fp and allow required perms to hal_fingerprint_default
/dev/teei_fp is used by fingerprint to communicate with Microtrust TEE drivers to
store fingerprint data on the device. Label it and allow relevant source required
permissions.

Denial observed without this change:
[   17.672144] .(4)[397:logd.auditd]type=1400 audit(1608975801.860:326): avc: denied { ioctl } for comm="fingerprint@2.1" path="/dev/teei_fp" dev="tmpfs" ino=15742 ioctlcmd=0x5402 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Test: Boot and notice denials have disappeared

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I8a7445400be241e81f8bf21347967b85381ed3ec
2020-12-30 16:14:31 +05:30
Aayush Gupta
54f06d5d7c non_plat: Label thermal binary and grant required perms
Thermal binary is used to load, throttle, manage thermal profiles on MediaTek devices.
Label it and grant required permissions for it to operate without any issues.

Test: Boot and notice thermal has now a proper domain and works without an issues

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Ibbc7e0ce907cd5eedd7826c658e7ef9c2d7a907d
2020-12-30 10:18:16 +05:30
Aayush Gupta
c0c34708a5 non_plat: Generate sysfs_net context for /devices/platform/CONNAC
CONNAC is MediaTek's Connectivity Combo Chip Driver, generate sysfs_net
context for it

Denial observed without this change:
[   59.165685] .(2)[399:logd.auditd]type=1400 audit(1609128934.244:404): avc: denied { open } for comm="Binder:4098_1" path="/sys/devices/platform/CONNAC/net/wlan0/address" dev="sysfs" ino=43157 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.google.android.gms

Test: Boot and notice that path now has a proper context

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I0c76124e953b80d06714340ab4413eee84e6f2ef
2020-12-30 10:14:20 +05:30
Aayush Gupta
0e29840d66 non_plat: Allow mtk_hal_camera rw perms for seinf device
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I4fe395de1e4c392d1f89a5976d3639fea3b7daab
2020-12-30 10:11:35 +05:30
Aayush Gupta
7a0a7ea6a5 non_plat: Label /data/vendor/camera/ and allow mtk_hal_camera create perms
Camera data files are store in /data/vendor/camera/ by camera hal on
treble devices. Label and allow mtk_hal_camera to manage it.

Denial observed without this change:
[   17.686535] .(4)[399:logd.auditd]type=1400 audit(1609114842.280:303): avc: denied { getattr } for comm="camerahalserver" path="/data/vendor/camera/back_dual_camera_caldata_wt.bin" dev="sdc46" ino=2490446 scontext=u:r:mtk_hal_camera:s0 tcontext=u:object_r:vendor_data_file:s0 tclass=file permissive=1

Test: Boot and notice denial has disappeared

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I98d0ddcce95cccdb9e86c4d36cb692e1f1ff41cb
2020-12-30 10:10:31 +05:30
Aayush Gupta
590a77d53d non_plat: Allow vold to manage sysfs_mmcblk device
During init, vold needs rw permissions in order to manage block devices.
This change allows the required permissions.

Denial observed without this change:
[    7.574441] .(1)[397:logd.auditd]type=1400 audit(1608975791.836:9): avc: denied { write } for comm="Binder:379_2" name="uevent" dev="sysfs" ino=35884 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_mmcblk:s0 tclass=file permissive=1

Test: Boot and observe that denial has disappeared

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I3fa256cf5957f0af3fa2628833820f0f9fcf298b
2020-12-28 00:45:07 +05:30
Aayush Gupta
1957ab0ba8 non_plat: Allow vendor_init to set mtk_dsbp_support_prop
DSBP property is set by multiple mediatek devices to declare support
for the same. It is already labeled in property_contexts but seems to
missing permission for vendor_init to actually set it.

Denial observed without this change:
[    4.713173] .(7)[1:init]selinux: avc:  denied  { set } for property=persist.vendor.radio.mtk_dsbp_support pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:mtk_dsbp_support_prop:s0 tclass=property_service permissive=1\x0a

Test: Boot and observe that propery is set without any denial

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I0cc0c2cadbf9edb3fb205b9e52074f852fe08658
2020-12-28 00:39:58 +05:30
Aayush Gupta
9a3e56224e non_plat: Introduce new label for setting mtk specific camera properties
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I1ce016d9e3a9cb7cda1170c830c7edd327528610
2020-12-28 00:39:45 +05:30
Vinay Gannevaram
b8d409439e sepolicy : Add rule to set property for wlan driver/fw ver info
wlan driver/fw version are set at property at enforcing mode.
Add rules to allow to set wlan driver/fw version info

CRs-Fixed: 2460816
Change-Id: Ic0bb570cd53fe450512496c5864f432ce3219bbe
2020-12-26 16:28:02 +05:30
Aayush Gupta
249759bf00 mediatek: Inherit lineage sepcific mediatek sepolicy
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: I9918ae0ce11bb41a6081d3137591d3626d337a74
2020-12-24 16:56:51 +05:30
Aayush Gupta
9029a49cc4 plat_private: Use newline at the end of service_contexts
Missing newline causes compile-time error when sepolicy squashes all given
service-contexts into single file to pack into the build. This change
fixes that issue.

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
2020-12-21 22:01:18 +05:30
Aayush Gupta
4fbc9434e9 non_plat: Remove duplicate sepolicy rules
These types are already defined in system/sepolicy and gives compile-time
errors. Remove them to resolve the issues.

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
2020-12-21 22:01:08 +05:30
Shanshan Guo
5da546820c [ALPS04968083] SEPolicy: Modify sepolicy files mode and type
[Detail]
The mode of sepolicy files should be -rw-r--r--,
and the type should be ASCII text with Unix/Linux format.

[Solution]
1.Use chmod 0644 to change sepolicy files mode.
2.Use iconv -t ASCII and dos2unix to change sepolicy files
  type and format.

MTK-Commit-Id: ee386fd7ca89105f70b96f6b58c5f0e372fe9a4b

Change-Id: Iac13b1ea8a4546168f68a7918acdcdb0588f6630
CR-Id: ALPS04968083
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-12-21 22:01:08 +05:30
Shanshan Guo
2b923a53d6 [ALPS05009976] SEPolicy: Merge folder non_plat and r_non_plat
[Detail]
BASIC and BSP project should have same sepolicies in basic/.

[Solution]
1.Modify SEPolicies in non_plat/ by comparing with r_non_plat/ .
2.Remove r_non_plat/ .

Change-Id: I24d3df00255779bd73f4075c1c4062176d5b6047
CR-Id: ALPS05009976
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-12-21 12:06:48 +05:30
Juju Sung
d9354577e0 [ALPS04971420] Update drm service executables file_contexts
regexp to better support mulitple variant context

Bug: 139134043
Test: DeviceManifest/SingleManifestTest.InterfacesAreReleased
Test: MediaDrmClearkeyTest
Change-Id: Iba8cbb5570b0731746857ba9f9ac578e2c95e450
CR-Id: ALPS04971420
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-12-21 12:00:53 +05:30
Huaiming Li
72c36f94b4 [ALPS04975618] fix dumpstate xTS fail
1. mnt_expand_file no getattr selinux rule

Change-Id: I14a31e6b4f778270ae1a684a5c1ea1407f4d6786
CR-Id: ALPS04975618
Feature: Android Exception Engine(AEE)
2020-12-21 11:26:39 +05:30
Cosmo Sung
0f5ea05394 [ALPS04968107] Error handling for RILD auto-restart
Allow rild to access MUXD property.

MTK-Commit-Id: 62289c439c81e3062c8908623706f2c02c95e3aa

Change-Id: I3a373cf8bef1da965eda3063e74670302f2cbf0c
CR-Id: ALPS04968107
Feature: DSDS (Dual SIM Dual Standby) Framework-Common Framework(RIL)
(cherry picked from commit b6c41fe738e7f1c27dc21c64c193f07670fb8044)
2020-12-21 11:25:53 +05:30
Aayush Gupta
4bbc8ad3be mediatek: Add a README and makefiles required for inclusion
Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
2020-12-21 11:15:09 +05:30
Anthony Huang
4769fb0d97 [ALPS04925594] EMI: add permission to concurrency_scenario node
Add permission to concurrency_scenario node for mediacodec

MTK-Commit-Id: df9f4afc7ecdf7a62b3bd7b79de24d2cde4ebd6a

Change-Id: I3b98ddd5d5b28c9f8f46df1a5089088edc5e4991
CR-Id: ALPS04925594
Feature: DRAM
2020-01-18 10:22:18 +08:00
FY Yang
85dca927d4 [ALPS04915107] HWC: Enable write permission for ged_debug
[Detail] Enable write permission for ged_debug, HWC can adjust
         vsync offset by GED.

MTK-Commit-Id: b21be9b4241111a7713f1dc45c57d773e68f39bd

Change-Id: If0e6e0bdc53ba0a2798fa1426cda9035cc66276c
CR-Id: ALPS04915107
Feature: Engineering Mode
(cherry picked from commit f7bec518d257ab2f70ff6824bfc4633c1b8da720)
2020-01-18 10:22:18 +08:00
Cosmo Sung
285280a8b6 [ALPS04882955] Error handling for RILD auto-restart
Allow rild to set gsm0710muxd_prop properties.

MTK-Commit-Id: 69e78e1d537a72aaca2ffecf4e708c007ad2f4ae

Change-Id: Ia5974d851cae7fd86c806c4db0f7b91975822895
CR-Id: ALPS04882955
Feature: DSDS (Dual SIM Dual Standby) Framework-Common Framework(RIL)
(cherry picked from commit c135e1fc7625cb3334278e0c9b6344bf81d46dc0)
2020-01-18 10:22:18 +08:00
Nixy Hsu
2213b28579 [ALPS04859387] gz: add nebula-ipc-dev0 sepolicy
[Detail]
set the same as trusty-ipc-dev0

MTK-Commit-Id: e5f995940b04d6bfde3760214f560d7458012700

Change-Id: I2cd96a5f196e3b1f7987e2b44ca708462e03ad06
CR-Id: ALPS04859387
Feature: GenieZone
Signed-off-by: Nixy Hsu <nixy.hsu@mediatek.com>
2020-01-18 10:22:15 +08:00
mtk07742
301f746c6d [ALPS04901917] Add getattr rule in system_server
Add getattr rule for storage_stub_file in system_server.

MTK-Commit-Id: 5a1c9e243e59f2269393b460a3e5f5c107fe3849

Change-Id: Iebad699b45a87b13e9d0b7079b3e985a87c8cca9
CR-Id: ALPS04901917
Feature: [Module]SystemServer
2020-01-18 10:22:14 +08:00
Lokesh Tripathi
3f78717205 [ALPS04888892] Bootanim selinux policy update
AEE_Warning Infinite-loop due to bootanim se_linux warning
System is in the terrible slow status, it is always reproduce
and cannot be recover when restarting system

MTK-Commit-Id: 4b2baa60941648e69063ecad0018e9c91c71253c

Change-Id: Ib80ee53ae09de42439a1851008a9884c006b707e
CR-Id: ALPS04888892
Feature: Boot Animation
2020-01-18 10:22:13 +08:00
xj wang
954e2fb5b7 [ALPS04897935] Sensor: fix VtsHalSensorsV2_0 fail
Add selinux permission to fix VtsHalSensorsV2_0Target
fail in vts_10.0_r2.

MTK-Commit-Id: 31032858c56fe57e0ec9972f0e1e67beb109d73a

Change-Id: I88c2f9878e96c7296759c03da8f18e5ecad39834
Signed-off-by: xj wang <xj.wang@mediatek.com>
CR-Id: ALPS04897935
Feature: Sensor Hub
2020-01-18 10:22:10 +08:00
Shanshan Guo
a18280258a [ALPS04897291] SEPolicy: Remove unused SEPolicies in prebuilts/ & private/
[Detail]
SEPolicies in prebuilts/ & private/ are unused.

[Solution]
Remove unused SEPolicies in prebuilts/ & private/

MTK-Commit-Id: b6fc2058aa96db7a6a3cf527da2aa402081e0246

Change-Id: I37373defdb00a4ac65f67e722b9320724e8bf92a
CR-Id: ALPS04897291
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-01-18 10:22:09 +08:00
Eric Chung
bd213b5098 [ALPS04838214] GPU: Enable SPHAL for GPUD
[Detail]
Enable SPHAL for GPU debugger in "r_non_plat"

MTK-Commit-Id: fe19a6c711597969f44251858d63aa8b96d5e7a3

Change-Id: I9bb43c8ea89e19945f1a365441689cbd35c66d66
CR-Id: ALPS04838214
Feature: OpenGL|ES
2020-01-18 10:22:08 +08:00
mtk07742
a362bc838a [ALPS04864529] Add rmdir rule for sf_rtt_file
Add rmdir rule for sf_rtt_file in system_server.

MTK-Commit-Id: 17998fb6c488974f0318f5a08e69e9e4cc1cef7e

Change-Id: If982b6d738d00affd2997691477ad67e8edf1fee
CR-Id: ALPS04864529
Feature: [Module]SystemServer
2020-01-18 10:22:07 +08:00
Jack-TC Lin
90aef177b8 [ALPS04814143] sepolicy for ATMs
[Detail]
for atms tuning

MTK-Commit-Id: 23f599db22fcc34548ad014c9a666c5b5cf9ea10

Change-Id: I4d0eb60fc67379658d81d8d88ecc46c07d4695f6
CR-Id: ALPS04814143
Feature: Camera Application
2020-01-18 10:22:04 +08:00
xin xu
6bb6ee6315 [ALPS04872217] ccci: after reboot, world mode id is wrong
add selinux sepolicy for ccci_mdinit.

MTK-Commit-Id: 159e957b1e591199fd6eab7ef0f09a8de47dfcdc

Change-Id: Ie0dbea1df8f655466fc63a4ac1eb1556563d9f16
Signed-off-by: xin xu <xin.xu@mediatek.com>
CR-Id: ALPS04872217
Feature: Modem Interface Driver
(cherry picked from commit 81d022e7e97d55d330e0a7bcf0885b63e2391e7b)
2020-01-18 10:22:04 +08:00
vend_mcd_am070
37c8952830 [ALPS04860912] Switch USB3.0 in EngineerMode
Switch USB3.0 in EngineerMode

MTK-Commit-Id: f40908497f08881a147016a60bf9f826a43f3ddc

Change-Id: I23a28ff07e19d02c0910171fc995cbdba6cfa038
CR-Id: ALPS04860912
Feature: USB 3.0 Device
2020-01-18 10:22:03 +08:00
Jun Wang (王军)
05b6acb923 [ALPS04870741] GPU: Add selinux policy for gpuservice (Revert)
[Detail]
Add selinux policy for gpuservice for gts issue
GtsGraphicsHostTestCases---com.google.android.graphics.gts.VulkanTest#checkVulkan1_1Requirements

This reverts commit b36a0ce9d20b7e39b4c932335842a861b00f676e.

Reason for revert: The GTS fail is not caused by sepolicy.

MTK-Commit-Id: 11cd557fb681b511edfbbf9bd363d75856a7dc2d

Change-Id: Iae1618bf7d91b324444affd3b11037a0340fc369
Feature: Vulkan
CR-Id: ALPS04870741
2020-01-18 10:22:00 +08:00
MY Chuang
945b222419 [ALPS04824757] mrdump: fix ioctl sepolicy
1. mrdump_tool was blocked by sepolicy by ioctl actions.
2. add 4 more items
   - FS_IOC_GETFLAGS
   - FS_IOC_SETFLAGS
   - F2FS_IOC_GET_PIN_FILE
   - F2FS_IOC_SET_PIN_FILE

MTK-Commit-Id: 926484c7b945397752926c9a605e3e2cd4b7ae19

Change-Id: Idadd2f3a2525a3cff8bd8a7b91c8dc76f2482546
CR-Id: ALPS04824757
Feature: Memory RAM Dump (MRDUMP)
(cherry picked from commit 81c51be3cfd29de37b3d4a02072813a4b4f25fa6)
2020-01-18 10:22:00 +08:00
swintegrator
ba675f90bd [ALPS04879324] SELinux sepolicy for TEEI OS communication Adjustment
Because teei_client_device and mobicore_user_device belong to BSP project,
we need to move SELinux sepolicy from BASIC to BSP project as well.

MTK-Commit-Id: f33102728ebc2c0969605800d73558741c3f0732

Change-Id: Ib9f8a68bde615593d971220655edb3bb9e83e3af
CR-Id: ALPS04879324
Feature: Secure Facial Recognition - 2D Sensor
2020-01-18 10:21:59 +08:00
Shane Chien
1c8313c394 [ALPS04824504] Audio: Add permission for rt5509 SmartPA
Add permission for rt5509 SmartPA to access device node.

MTK-Commit-Id: 2dcda2ed6418dc8c60f0e696e31fde0642b53554

Change-Id: I1c08f0aff93f8984a685b70374f434972d5b7c8c
CR-Id: ALPS04824504
Feature: Phone Sound
2020-01-18 10:21:55 +08:00
Jun Wang
7e16e3c233 [ALPS04870741] GPU: Add selinux policy for gpuservice
[Detail]
Add selinux policy for gpuservice for gts issue
GtsGraphicsHostTestCases---com.google.android.graphics.gts.VulkanTest#checkVulkan1_1Requirements

MTK-Commit-Id: b36a0ce9d20b7e39b4c932335842a861b00f676e

Change-Id: I163153bc1a9f1b8ebef6cb7dc2224e4a70762394
Feature: Vulkan
CR-Id: ALPS04870741
2020-01-18 10:21:55 +08:00