Refactoring hdmi service as hidl service,so that
other process can call hdmi services API.
Add Selinux permission for hdmi hidl service.
MTK-Commit-Id: 0ecef9e52ce92b52413fbecd2b5be492806b8f53
Change-Id: I7f1c5f48d4ae9777acc80436a4af801f32969fac
CR-Id: ALPS04707246
Feature: [Module]Settings
[Detail]
mtk_em_tel_log_prop is defined in bsp/, the rule in basic/ will
cause error while building basic project.
[Solution]
Move the rule of mtk_em_tel_log_prop from basic/ to bsp/.
MTK-Commit-Id: 0d04d80f653343466407bd1dd3b260bfdd0859a9
Change-Id: Ibb01bd54502f5178fc35429c5df128a6c319e812
CR-Id: ALPS04668349
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
There are some selinux violation for app in MTBF,
need to add some sepolicy for them.
[Solution]
1.Add sepolicy
2.Move sepolicy of untrusted_app_* to untrusted_app_*.te
3.Modify sepolicy
MTK-Commit-Id: 62b5c74c6d1d85acf0184fc18fca0b40c4a8e60c
Change-Id: Icac33ccc54b691ee0e4ab7088f77adb1c1a4a549
CR-Id: ALPS04640303
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
There is a workaround for bring-up,
now it needs to be modified.
[Solution]
1.Split workaround to sepcial *.te
2.Modify ged sepolicy
3.Modify mistake
4.Add sepolicy
MTK-Commit-Id: 5a2b7e3fdc826a7ca6bc70a3810f14c1661e7d79
Change-Id: I0894de45e014a5eae754e35b57fbc9b21bc4bf90
CR-Id: ALPS04639771
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
md_monitor will build to vendor image, now it will use HIDL to connect
with JAVA user.
device.mk, SELinux policy about md_monitor need change from system to
vendor, and add relate contents for HILD service.
MDML change:
PlainDataDecoder now need use new constructor with a context, old
constructor will throw an Exception.
For single modem bin:
layout and filter bin file will move from /data/md_mon to
/data/vendor/md_mon. JAVA user shall get layout file via HIDL, then
save a temp file in its cache folder.
For non-single modem bin:
layout file move from /system/etc/mddb/ to /vendor/etc/mddb/, filter bin
file move from /system/etc/firmware/ to /vendor/etc/firmware/. And
system process can access /vendor/etc/. So dont need other change.
MTK-Commit-Id: be91b65d9497e3190ea1127bc71ed2abcb32ed98
Change-Id: I5c99f81c4be7a9f41d3b955156ab3e50ec655d97
CR-Id: ALPS04660543
Feature: Modem Monitor(MDM) Framework
[Detail]
For Andorid Q, there is a more stringent restriction for ioctl,
app need some permissions to access proc_ged by ioctlcmd.
[Solution]
Group existing sepolicies for different types app to access
proc_ged by ioctlcmd together in appdomain.
MTK-Commit-Id: e9ba9a00dbbc063388c8120048a72fd8f7ce497c
Change-Id: I24a4671259a68a0fda756d37c16b7e61801e6cc8
CR-Id: ALPS04428389
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
For Andorid Q, there is a more stringent restriction for ioctl,
system_app need to access proc_ged by ioctlcmd=0x6700
MTK-Commit-Id: c610a674e4a9dcdadde0eb619326359253f59f15
Change-Id: I33cd7c4e29b6bec1dc0956cf6d4a136f08f1d511
CR-Id: ALPS04345534
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
system_writes_vendor_properties_violators is only workaround,
and will cause *TS test fail, so remove the workaround and
corresponding rules that cause build fail.
MTK-Commit-Id: f637c1416b591c821bc9c18fd3dbf3aa5f9038af
Change-Id: If09922120de0742ec47d7c0522168d4e78a4e74f
CR-Id: ALPS03878175
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
System APP cannot set vendor property, and these
polices is not used. Just remove these policies.
MTK-Commit-Id: 0805ff18c4d4f90b2e9d2fdb97e1eff810ae5096
Change-Id: Ib07ef6d587d688246884fff6505434b7b7bc708c
CR-Id: ALPS03885471
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK