[Solution] Make service auto run.
MTK-Commit-Id: 5e7859bac9dd91730634cfa9623936ee8f630fef
Change-Id: I6ae5c40a6d12d077bfe8093cdf7f4d9b32698a82
CR-Id: ALPS04085854
Feature: MTKLogger
(cherry picked from commit a8d2a91b7b056b3825e55dbbad4045dff361d08e)
Spending more bootup time after label kernel interface node
in file_contexts, there is another way to label kerner interface
node on genfs_contexts file. When move the label rule to
genfs_contexts file, the bootup time will speed more than 500ms.
MTK-Commit-Id: e237c9367e74f2953b843cc9224a98b4e7cfddbc
Change-Id: I1a1e369c3eaaf359c3bf7c051793a3ffba4c71fc
CR-Id: ALPS04017619
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail] aee_aedv_exec is defined in system.img, and when AOSP system.img
is replaced, cts will fail if aee_aedv_exev is referenced in vendor.img.
MTK-Commit-Id: 178b71c788561cea1336d2c62b67dd324ecf6e8b
Change-Id: I200ff7cd55597de05d5412677b140809e941a192
CR-Id: ALPS04056497
Feature: Android Exception Engine(AEE)
[Detail]
SEPolicy rule that put in plat_private folder will be placed in system image.
So, It will be overwrited after flashing GSI.
[Solution]
Move MTK rules to non_plat folder instead which will be placed in
vendor image.
MTK-Commit-Id: 91e5023b67f0ce18e5e364adce5da5413c71fc69
Change-Id: I372b059e44c4bbfd6d4a92a790846b2228213b88
CR-Id: ALPS03998186
Feature: Treble
[Detail]
Fix tpd auto test fail in factory mode due to sysfs nodes
are not allowed to read directly.
[Solution]
update touch setting sysfs policy and add to factory mode
MTK-Commit-Id: d8733ca0938653098f5ec1f5462c1723d8f67894
Change-Id: I3fb6a46cfbf02fe050174501a2606404a53bb2ad
CR-Id: ALPS03869354
Feature: [Android Default] CapTouch
[Solution]
Factory mode should build in vendor partiton, so move
factory from system partition to vendor partition
MTK-Commit-Id: c55354593a97aed3af9d0b2584037d03d3d2669c
Change-Id: I5a607b60f9ac974380c5e440a6fa0c51797d6b1b
CR-Id: ALPS03932298
Feature: Factory Mode
[Detail]
In order to meet selinux limitation, storagemanagerd act as
vold context to mount storages
[Solution]
Add the following line in file_contexts.
/system/bin/storagemanagerd u:object_r:vold_exec:s0
MTK-Commit-Id: 0b309fd0afc84f3da0ea91a324dca6f824366537
Change-Id: I68e568b8e7d37d218ae88e82cdd509c32abaea66
CR-Id: ALPS03943904
Feature: Mobile Log Tool
[Detail] Move meta_tst from system to vendor
[Solution]
modify sepolicy/basic
MTK-Commit-Id: 4bac131e38e71904dfc6f69a0b1ec15f46a08881
Change-Id: I571edd67cf3f59c293aa2aa674292380b86fcf38
CR-Id: ALPS03909621
Feature: SP META Tool
[Detail]
Refine vibrator sysfs label, using aosp defined device
Moreover, move it to basic folder due to its basic used
MTK-Commit-Id: 41053b65c8c26973005988d1ad14208fff98fde6
Change-Id: I9ed6ece496ea1ffff9f777fb1f90c76638ad979f
CR-Id: ALPS03869354
Feature: [Android Default] Backlight
[Detail]
Move kisd from system to vendor and add keymanage hidl
[Solution]
Modify related sepolicy in device/mediatek/sepolicy/basic
MTK-Commit-Id: c1826ac0bdcc18a4e6d3298e73514801a35a09ad
Change-Id: Iee4b65ba5addc5a21de53e76d3bb092e2f37ab01
CR-Id: ALPS03853366
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
Android has defined neverallow rules
to restrict direct access to system files.
We need to have a custom label for each policy.
[Solution]
Define custom label for drmserver
MTK-Commit-Id: c84c43b87a6ac2651a0562b8818bc66516e4a50b
Change-Id: Ide4fc49628508aee77e67f3213749210430153a3
CR-Id: ALPS02333452
Feature: OMA DRM V1.0
Should add vendor_file_type for vendor files, and
add core_data_file_type for system files. Vendor files
and system files are differented by file path.
MTK-Commit-Id: 602eb35b36c658789e093e2730b16b9b5c892c0f
Change-Id: Ibacc08427f332741f12757c66ecbb8ce91b76416
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK