6 Commits

Author SHA1 Message Date
hua.tian
608a6fd139 [ALPS04709387] Support to catch MCUPM log
Add SELINUX rule for MCUPM log.

MTK-Commit-Id: 9fb8d206f37f0fb00581f4417473974c014ff0dd

Change-Id: I7a935534d4975e444b556d133ff222a4c144b5ca
CR-Id: ALPS04709387
Feature: Mobile Log Tool
2020-01-18 10:17:51 +08:00
hua.tian
7574cf2c9c [ALPS04649268] Move SELINUX policies to plat_private
These policies are for system process, as a result,
move it to plat_private folder.

MTK-Commit-Id: 46e87002024d5675d566dd59f77cbde9c69bdd37

Change-Id: I9c2b72136d1f1c3062f0ac6b174c8334b1965e80
CR-Id: ALPS04649268
Feature: Mobile Log Tool
2020-01-18 10:16:47 +08:00
bo.shang
5068833fef [ALPS04532537] Copy vendor modem db and filter
New feature:

Add selinux of HIDL service and client.

Use HIDL copy modem db and filter from vendor image

to data partition for modem log tool.

MTK-Commit-Id: 7fadaf0f2a60d05d7464264ef9e23a75ca27bb66

Change-Id: I12cc8614537f30e90a1717f9838c52283342eb55
CR-Id: ALPS04532537
Feature: Modem Log Tool
2020-01-18 10:15:08 +08:00
Po Hu
4f97064d35 [ALPS04209994] Android Q migration prepare
[Detail]
Fix build warning like:
WARNING unrecognized character at token ^M on line XXX:

[Solution]
Use dos2unix to update files

MTK-Commit-Id: 8285bcfe7a30349f3188c9b29e4b8da9ee2c1280

Change-Id: I7773e243028a2275d11782885b4bc299d5c5d043
CR-Id: ALPS04209994
Feature: build process
2020-01-18 10:08:11 +08:00
mtk12101
c7ac9f171a [ALPS03825066] Resolve build error
[Detail]
1.Google add new neverallow rule for untrusted apps
2.The file/dir in /proc must associate with proc_type

[Solution]
1.Remove rules which violate google neverallow rules
about untrusted apps
2.Add proc_type attribute for file/dir on /proc

MTK-Commit-Id: b94412725e3a7b18db9573056c2fb43367989ed5

Change-Id: I89de16a65f05d052969c794604b9c372ed1ce7e1
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
2020-01-18 09:38:47 +08:00
mtk33297
1cbaa678fe [ALPS02333452] Android p selinux change
[Detail]
Android has defined neverallow rules
to restrict direct access to system files.
We need to have a custom label for each policy.

[Solution]
Define custom label for drmserver

MTK-Commit-Id: c84c43b87a6ac2651a0562b8818bc66516e4a50b

Change-Id: Ide4fc49628508aee77e67f3213749210430153a3
CR-Id: ALPS02333452
Feature: OMA DRM V1.0
2020-01-18 09:38:07 +08:00