[Detail]
AOSP has defined neverallow rules
to restrict direct access to system files.
[Solution]
Since MTK does not use "/data/misc/bluedroid/" to
store BT address. It should be alright to remove
this kind of thing.
MTK-Commit-Id: 5b3aae9aebd39c24a3846c27c7ca9fceda9513d3
Change-Id: I5a8420e9f5259259b2bd11a6da033a140f0bea7c
CR-Id: ALPS03893095
Feature: BT Chipset Capability
[Detail]
Android has defined neverallow rules
to restrict direct access to system files.
We need to have a custom label for each policy.
[Solution]
Define custom label for drmserver
MTK-Commit-Id: 996de9ff486db13908f6d58b476613957d4f336d
Change-Id: I34c8d86c1baf9daa02e29323007e4136c6048b31
CR-Id: ALPS02333452
Feature: OMA DRM V1.0
[Detail]
1.Google add new neverallow rule for untrusted apps
2.The file/dir in /proc must associate with proc_type
[Solution]
1.Remove rules which violate google neverallow rules
about untrusted apps
2.Add proc_type attribute for file/dir on /proc
MTK-Commit-Id: b94412725e3a7b18db9573056c2fb43367989ed5
Change-Id: I89de16a65f05d052969c794604b9c372ed1ce7e1
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
Android has defined neverallow rules
to restrict direct access to system files.
We need to have a custom label for each policy.
[Solution]
Define custom label for drmserver
MTK-Commit-Id: c84c43b87a6ac2651a0562b8818bc66516e4a50b
Change-Id: Ide4fc49628508aee77e67f3213749210430153a3
CR-Id: ALPS02333452
Feature: OMA DRM V1.0
[Detail]
Mobile Log selinux rule porting:
1. fix the violation on P
2. relable some kernel interfaces.
MTK-Commit-Id: 4108ed13f3e7693c3642b6f073c5444f133b3c38
Change-Id: I1fac185779510f10b9b94bdf6ec40573237d846a
CR-Id: ALPS03886572
Feature: Mobile Log Tool
[Detail] Modify meta_tst.te for Android P
[Solution]
Add comport type and uart info sepolicy
MTK-Commit-Id: b2f1a2b46f1bc8135b98dd306ff4353b3ba5383f
Change-Id: Ib40eb5e5a9512d7d33b25b191e04eab9684fe121
CR-Id: ALPS03888283
Feature: SP META Tool
[Detail] Vendor partition shouldnt access aosp defined property
which is not in whitlist. So remove the related changes of labeled
aosp property.
This reverts commit 9d534a80d67e7457a1411b8b36249898ed4c6986.
This reverts commit 901fb42d2e3856a139b90420922f558d7231ea7d.
This reverts commit 41dc8fb567b409e149e59f4f514268ca5883c7ab.
[Solution] Remove label of ro.sf.lcd_density.
MTK-Commit-Id: 02cf063b8407a9d9242f064c86767200e9c0ac0a
Change-Id: I02dcc2fa3fda95c498f0ef70d9aa6bd9224d3b02
CR-Id: ALPS03869840
Feature: [Module]SurfaceFlinger/HWComposer
[Detail]
add dev policy for fw_log_gps
[Solution]
add dev policy for fw_log_gps
MTK-Commit-Id: 4435dfa949ec7886ca9015a93bcf175568ab1621
Change-Id: I88a56ee23d456e5d43036fba79acd34ce024d35d
CR-Id: ALPS03866092
Feature: MTKLogger
(cherry picked from commit aa7953e06029de4ad0bcc0e615aef842eedc6460)
(cherry picked from commit ffa21f0c868c50daeff539f7be970d5398d8c3e6)
[Detail]
1. Since Android P, system and vendor cannot use
on-disk files to communicate.
Nvram is vendor_data_file, while audio-daemon is system process.
2. Actually since Android O, audio-daemon use
AudioSystem::getParameters() to send command to audio driver who is
the real one who touch the nvram. This is already a HIDL,
In other words, audio-daemon does not touch nvram directly.
[Solution] Remove unnecessary policy, which may cause build break.
MTK-Commit-Id: ed37b24d8b1d939ee4d428e3ed49ba3155e953ec
Change-Id: I87c9cf8a6fb3952e24f0fb140b5cc65a59712350
CR-Id: ALPS03878175
Feature: Audio Tuning Tool
[Detail]
Since Android P, battery-related information should be declared as native
sysfs_batteryinfo, which can be accessed by healthd and other processes
asking for battery information.
[Solution]
1. Remove sysfs_power_supply.
2. Change the usage from sysfs_power_supply to sysfs_batteryinfo.
MTK-Commit-Id: 5713190900415312f7904cdf6d46a891996d5786
Change-Id: I10099570afdb48f0806d6979a3fb11b9b9e59fbe
CR-Id: ALPS03861775
Feature: Charger
[Detail]
1.The types on /sys/ must be associated with the
"sysfs_type" attribute: sysfs_keypad_file
2.sysfs_type only have read permission
[Solution]
1.Change sysfs_keypad_file to sysfs_type
2.Modify the permission to read about sysfs_type
MTK-Commit-Id: 4cf285589167b25623a67c6b951c796846a9a3ad
Change-Id: I3dd516eaf9959611c9a2b003cb3af07a35da5442
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK