Add SELINUX policy for mobile_log_d to save log in /data/debuglogger
and for getting log from adb.
MTK-Commit-Id: 8775f10bd89be7ac112cbc56daf422814f0f385f
Change-Id: I39e5e1d0ccb2381ef302c187ff83a9e9cb0fa959
CR-Id: ALPS04649268
Feature: Mobile Log Tool
[Detail]
Add sepolicy access right for Hifi3 adsp device.
Mobilelog and AED will need these access right.
MTK-Commit-Id: 06ac39d7cebbab2bcb3468fcf14f19b7e1489819
Change-Id: Ic834ac687b4423500ef6036824a6d6f75e57ccb3
CR-Id: ALPS03738758
Feature: [Module]Audio OpenDSP
[Detail]
System properties like init.svc.vendor.* cannot be dumped
in mobilelog. It is because moblelogd doesnt have permission to
access them. The status of VoLTE-stack cannot be shown in
mobilelog.
[Solution]
Add get permission to access those system properties
MTK-Commit-Id: 73a911ef7934cdb4640809343f64c9815c43f1be
Change-Id: I6c11e5a397826c45ca83cb19ce6cb114aee59f53
CR-Id:ALPS03908242
Feature:VoLTE (Voice over LTE)
[Detail]
make Mobilelog its own properties only used in system partition
MTK-Commit-Id: 98c61ef31a7a7a09bed1c492a9dc1e7c1f12c47e
Change-Id: Iceea093a055817f4ccc8350c3543433b83ecc2f2
CR-Id: ALPS03976171
Feature: Mobile Log Tool
Some rules is no need any more, need to remove it.
MTK-Commit-Id: 49685f1299d990a7195a2d54b955517d8f2cc699
Change-Id: I4a590ad781589cf94989ce72c88751ac10b82eae
CR-Id: ALPS03982747
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
1. Change type name from sysfs_boot to sysfs_boot_mode
2. Add type name sysfs_boot_type
MTK-Commit-Id: 54d5bb31fc8ad1d9ac2e931fe5dc01ef4c1083cf
Change-Id: I445ecdf5a5e334a49ccc1d747daa87f6be351d20
Signed-off-by: Peter Wang <peter.wang@mediatek.com>
CR-Id: ALPS03901606
Feature: UFS Booting
[Detail] Because "ro.vendor.net.upload.benchmark.default"
is unlabeled property, so all use it will have name of
vendor_default_prop
[Solution] Need owner to relabel the property of
"ro.vendor.net.upload.benchmark.default"
MTK-Commit-Id: 3a772e2b252536c9bbe9829b75f3464c2df68248
Change-Id: I42f341bf01cea16a16a0e73d13e0c03b5c270dad
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail] System processes have no permission to access
vendor_default_prop
[Solution] Add get vendor_default_prop rule for system
processes
MTK-Commit-Id: ad4fb4d8ae4fb38767c16b82ce9d8351f5f59702
Change-Id: I31cf13db6b50a3cff193aa0a34bc1130e5b18942
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail]
Mobile Log selinux rule porting:
1. fix the violation on P
2. relable some kernel interfaces.
MTK-Commit-Id: 4108ed13f3e7693c3642b6f073c5444f133b3c38
Change-Id: I1fac185779510f10b9b94bdf6ec40573237d846a
CR-Id: ALPS03886572
Feature: Mobile Log Tool
Restore the policies accessing files labeled
as proc_xxx or sysfs_xxx, but there are some
exceptions for coredomain process, such as
meta_tst,dump_state,kpoc_charger
MTK-Commit-Id: 7953b5203bb3cac099c3326d330643b4cd73746d
Change-Id: I4b16c09c352891783e837bea370c264966ca6d13
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK