Add a rule to allow vendor_init have write permission
to proc_wmtdbg.
MTK-Commit-Id: fcdffbb167f1e860b31027357c5249c99b4b0281
Change-Id: I7b74e284ce9d9de1400c59bbf1f3e11188ec5245
Signed-off-by: Tim Chang <tim.chang@mediatek.com>
CR-Id: ALPS04294481
Feature: [Module]WMT Driver
[Detail]
For Andorid Q, there is a more stringent restriction
for ioctl, app need to access proc_ged by ioctlcmds.
[Solution]
Add sepolicy for app to access proc_ged by ioctlcmds.
MTK-Commit-Id: 630cfe13e5928346453bb3800b75439d5e9e1235
Change-Id: I1bde81017e78d5b70fc78dd5fa148667360d2af4
CR-Id: ALPS04501651
Feature: Power Management
[Detail]
netd_socket is deprecated in a/26f84c6.
The netd_socket used in mulitple modem generation,
for cross modem compatibility we add a dummy label to
prevent splitting new branch.
MTK-Commit-Id: b949378b387f9eb942de90b7475aea4ec711f68c
Change-Id: I5179175d9df973a0da01d4520269468b70f742ce
CR-Id: ALPS04284125
Feature: Modem Interface Driver
Add sepolicy to resolve the kernel api dump.
MTK-Commit-Id: 471082eb801521fcba7cb9a2dc9105e9832047b7
Change-Id: Ica2001bcb4c998f2cdb2cba26f5351ea72c65153
Signed-off-by: Figo Wang <figo.wang@mediatek.com>
CR-Id: ALPS04501667
Feature: Power Management
Add whitelist for the following properties,
ro.lmk.use_minfree_levels
ro.lmk.low
ro.lmk.medium
ro.lmk.critical
ro.lmk.kill_timeout_ms
ro.lmk.swap_free_low_percentage
This is just a temp solution because those properties should be
put in system/sepolicy/public/property_contexts, but it is not
ready currently. Once it is ready for those properties, this
patch will be rolled back.
MTK-Commit-Id: bc8b76b56605d264af1727cd234a5406da372744
Change-Id: Id8db6725e9dfeeeebd401c8922fe8004c5f5c5b4
CR-Id: ALPS04455690
Feature: Memory Optimization
mtk_agpsd needs to save some data in mnt_vendor
MTK-Commit-Id: 9a16e787248a3b6e07dea75bdeee2428ef8ceb2c
Change-Id: I55715e48c3c56e700725cc223ac08f753433cd5d
CR-Id: ALPS04418703
Feature: A-GPS
For Android Q, there is a more stringent restriction for ioctl,
system_server need some permission to access proc_ged by ioctlcmd
in MTBF.
MTK-Commit-Id: 6fe037cc18f278a95a919bb3188ae50fb880a36e
Change-Id: I4f4a3b13f3ee49920ebb588ed5e7094ae0065494
CR-Id: ALPS04462320
Feature: [Module]SystemServer
[Detail]
Same process hal modification
MTK-Commit-Id: 54746202d1051616f8d4e65c13d516063899040f
Change-Id: I31873741ce1a25106552d3cc83b22ef866f49433
CR-Id: ALPS04431046
Feature: OpenGL|ES
(cherry picked from commit 53d59eca15de0fdfc5ab1eb6e7ebe45a8dc9ba91)
For Android Q, there is a more stringent restriction for ioctl,
system_server need some permission to access proc_ged by ioctlcmd
in MTBF.
MTK-Commit-Id: b3250e2378854b801fd8602b5369b48d91268993
Change-Id: I46d46e62dfb7fcc8a5675cc7584fd8f8e069238f
CR-Id: ALPS04462320
Feature: [Module]SystemServer
[Detail]
For Andorid Q, there is a more stringent restriction for ioctl,
app need some permissions to access proc_ged by ioctlcmd.
[Solution]
Add sepolicy for app to access proc_ged by
ioctlcmd=GED_BRIDGE_IO_BOOST_GPU_FREQ.
MTK-Commit-Id: 1d7bd0172f33336abcc94349978bbbd008f5fe9d
Change-Id: I62f422f072dc0881ea4c9f082a4c548b7164d58d
CR-Id: ALPS04449311
Feature: Power Management
[Detail]
Build error due to miss ;
MTK-Commit-Id: 9ff79edcad3b00db3ed3143b62a5078a8765f3de
Change-Id: Idccb173c592417bd36bc71c096b21c1f255204d4
CR-Id: ALPS04400468
Feature: [Android Default] Camera Application Basic Functions
[Detail]
1. Add system server permission for power_hal_mgr_service
2. Remove su permission
3. Use macro to set permission
MTK-Commit-Id: 465f6b986296ecd46404c4cfd497bfd80c0a1842
Change-Id: I65041fd264cae53b850e013f12679c84c3b9eb36
CR-Id: ALPS04328846
Feature: [Module]PowerHAL
when open selinux, mp3 playback will lead to high power loading,
reason is that due to selinux,mediaextractor process cant get
music process name, so lower power feature cannot work
Add sepolicy to fix the issue.
MTK-Commit-Id: 10dad319efacefe5807a7932a63ca34f6bb881a5
Change-Id: I1e41f0e07134fad957fe3f98b99fcc8985f3ebd7
CR-Id: ALPS04427301
Feature: [Android Default] MP3 Playback
[Detail]
For Andorid Q, there is a more stringent restriction for ioctl,
app need some permissions to access proc_ged by ioctlcmd.
[Solution]
Group existing sepolicies for different types app to access
proc_ged by ioctlcmd together in appdomain.
MTK-Commit-Id: e9ba9a00dbbc063388c8120048a72fd8f7ce497c
Change-Id: I24a4671259a68a0fda756d37c16b7e61801e6cc8
CR-Id: ALPS04428389
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK