[Detail] Add selinux permission for
usb online status checking.
MTK-Commit-Id: fa788cddb4ddc90b3611a67f5905765410dd54d5
Change-Id: Ica59ffca98340e03be24f7ec7e4b62390ef12de9
CR-Id: ALPS04110031
Feature: SP META Tool
[Detail] add permission for meta_tst
to set system clock
MTK-Commit-Id: 08d1dd39711fcea7acbb9b0da2d2418cf59a9cde
Change-Id: I2e49acfc69db0c1786d7c373873fa1a49501a2e9
CR-Id: ALPS04069430
Feature: SP META Tool
[Detail]
1. Set audio hal as RT thread for USB call and fast record
2. Revise mt3967 to add 4.0 service
3. Replace 2.0 with 4.0
MTK-Commit-Id: 762c6ab286f7b22ca349b82c5e5d0bd7e2891c61
Change-Id: I1bbb3ea67c2bc631116077cf6a88f40cced38a54
CR-Id: ALPS03889880
Feature: [Module]Audio HAL
[Detail] Meta support one key to catch log
[Solution] Meta connect log hidl service
and send socket command
MTK-Commit-Id: 3e935bdb1164fefd257c4bccc33a85aadbc88e58
Change-Id: I12c9a080ebcbd360cde7d8b0d26423cb3c6fb1e1
CR-Id: ALPS04028748
Feature: SP META Tool
(cherry picked from commit a2e072ccbdfccd4a3248fc8b27d7c5fa69ba5896)
[Detail]
Add permission for meta_tst to get kernel uevent via socket
MTK-Commit-Id: d30205369cf482796fcd75feb9e1592e17ba1f61
Change-Id: I11acdd38467d84ce8a62e0ec5b780fca5c90f3b6
CR-Id: ALPS03888283
Feature: SP META Tool
(cherry picked from commit a793e5c40cc75eee4657764c02fc6c109b02e51f)
(cherry picked from commit 9d9369dfe0edb7d1114710f8afca2282f448cf0e)
[Detail]
Fix selinux policy config for meta_tst audio part for android P
[Solution]
Fix selinux policy config for meta_tst audio part for android P
MTK-Commit-Id: c8ad0a5f7b240cd44ca8bd961418e0ceb9b8ad65
Change-Id: Ibac06bd6122256c5067046a660b8c4e7d9de1051
CR-Id: ALPS04021455
Feature: SP META Tool
Some rules is no need any more, need to remove it.
MTK-Commit-Id: 49685f1299d990a7195a2d54b955517d8f2cc699
Change-Id: I4a590ad781589cf94989ce72c88751ac10b82eae
CR-Id: ALPS03982747
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
In P version, process needs add net permission to access socket.
MTK-Commit-Id: 4cd65a5adf83ee597402220297cf8d7b727f3da0
Change-Id: I39fbeb59e146fc508cc721ddb299fedc15a70a6b
Signed-off-by: Black Chen <black-ch.chen@mediatek.com>
CR-Id: ALPS03969178
Feature: [Module]Wi-Fi Driver
(cherry picked from commit 1569bcd159fe2472597e2bf2b3c5016f44d7756d)
[Detail] Power off after usb plug out
[Solution]
Modify meta_tst.te
MTK-Commit-Id: 65137c0258d35d8f2998f6269173f00b686ee29a
Change-Id: Ib876b440249f9d3b6e9d42c1d95ef15f6ca386ef
CR-Id: ALPS03888283
Feature: SP META Tool
[Detail]
Because Android P impose so many restrictions, it is difficult for
meta mode or factory mode to format partitions. A new design is
adopted as follows:
1. Meta mode or factory mode write all 0 to first 4KB of target
partition.
2. When entering kernel booting, the partition mount process in the
original init flow find that XXX partition is wiped and automatically
format XXX partition.
In step-1 described above, selinux rules shall be added for meta_tst or
factory.
In step-2 described above, selinux rules shall be added for mke2fs.
MTK-Commit-Id: 7e9bbd418ca6353ba89ecffdc016c78504583bf3
Change-Id: I3dd869c57107b0ebebf3134f69c50744df8f8ff9
CR-Id: ALPS03957630
Feature: SP META Tool
[Detail] modify sepolicy
[Solution]
modify sepolicy for read and write system and proc/bootprof
MTK-Commit-Id: 2df7f3b055778e043c9cc2ad75a2c9a7abcb7ad6
Change-Id: I3c4f4dd2435a2b2dee72c54d60e9e1adf2ec671f
CR-Id: ALPS03888283
Feature: SP META Tool
[Detail]
Fix tpd auto test fail in factory mode due to sysfs nodes
are not allowed to read directly.
[Solution]
update touch setting sysfs policy and add to factory mode
MTK-Commit-Id: d8733ca0938653098f5ec1f5462c1723d8f67894
Change-Id: I3fb6a46cfbf02fe050174501a2606404a53bb2ad
CR-Id: ALPS03869354
Feature: [Android Default] CapTouch
[Detail] modify meta_tst.te and file.te
[Solution]
P Migration meta_tst get com port type/uart port info/boot mode/usb state/usb close
MTK-Commit-Id: 650d2e874dd8e73a5b79f911ba6bb6579c7819c1
Change-Id: Ie405027bcb4b567721c531a94a3a6247fa15689b
CR-Id: ALPS03888283
Feature: SP META Tool
[Detail] Move meta_tst from system to vendor
[Solution]
mark not allowed sepolicy
MTK-Commit-Id: c577af5726938689d27f3f9cf94dbdd3d49037e4
Change-Id: I5f4e682abeeb0b84dfd938e697234c36edac4ae3
CR-Id: ALPS03909621
Feature: SP META Tool
[Detail] Move meta_tst from system to vendor
[Solution]
modify sepolicy
MTK-Commit-Id: 8c8bd1670f4a1ef1bce11e8791d6561acb50bf56
Change-Id: Ia003185b640bf1113323095ac86178ef0658f142
CR-Id: ALPS03909621
Feature: SP META Tool
[Detail] Move meta_tst from system to vendor
[Solution]
modify sepolicy/basic
MTK-Commit-Id: 4bac131e38e71904dfc6f69a0b1ec15f46a08881
Change-Id: I571edd67cf3f59c293aa2aa674292380b86fcf38
CR-Id: ALPS03909621
Feature: SP META Tool
[Detail] Modify meta_tst.te for Android P
[Solution]
Add comport type and uart info sepolicy
MTK-Commit-Id: b2f1a2b46f1bc8135b98dd306ff4353b3ba5383f
Change-Id: Ib40eb5e5a9512d7d33b25b191e04eab9684fe121
CR-Id: ALPS03888283
Feature: SP META Tool
Restore the policies accessing files labeled
as proc_xxx or sysfs_xxx, but there are some
exceptions for coredomain process, such as
meta_tst,dump_state,kpoc_charger
MTK-Commit-Id: 7953b5203bb3cac099c3326d330643b4cd73746d
Change-Id: I4b16c09c352891783e837bea370c264966ca6d13
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK