| Commit message (Collapse) | Author | Age | Files | Lines |
| |\
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Bug: 151102302
Test: Section 6 in vendor/mediatek/build/wembley_tools/merge_process.txt
* commit '0798bcf47bb0fb9796548032b0766f6444798a91': (827 commits)
[ALPS05003224] thermal hal service sepolicy
[ALPS04958679] EM:remove phone UID
[ALPS04991295] relable aee_aed/aee_aed64 to crash_dump
[ALPS05025613] SEPolicy: Modify neverallow rule for system_data_file
[ALPS05014766] SEPolicy: Modify property with new attributes
[ALPS04890169] RTC: add permission for system_server
[ALPS04975618] add aee hidl service
[ALPS05009976] SEPolicy: Merge folder non_plat and r_non_plat
[ALPS04956865] mmstat: allow vendor to access tracing instances
[ALPS04971420] sepolicy: add inode2filename neverallow rule
[ALPS04971420] sepolicy: add inode2filename neverallow rule
[ALPS04885863] charger: add power_supply class support
[ALPS04975618] fix dumpstate xTS fail
[ALPS04995993] [META]Connect META failed
[ALPS04991295] create minicoredump/coredump fail
[ALPS04995993] [META]Failed to connect meta
[ALPS04975618] add aee_aedv proc file selinux rule
[ALPS04949825] WMT: add sepolicy
[ALPS04994589] SEPolicy: Modify neverallow rule for system_data_file
[ALPS04984342] battery: add power_supply class support
...
Change-Id: If97bc5bb23fabad7f62efcdbda3a3fa0ba7ec307
|
| | |\ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
add sepolicy for thermal hal 2.0 service
Change-Id: Id6cbab5e82ceb415febe76e0ed16b930ec4a8b47
CR-Id: ALPS05003224
Feature: Thermal Management
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Detail]
1. Move em hidl definition from non_plat to public
2. Remove EM sepolicy rules from radio.te
Change-Id: Id818343a3d7d3a24e425b38aed697e46994b8a93
CR-Id: ALPS04958679
Feature: Engineering Mode
|
| | |\ \
| | | |
| | | |
| | | | |
alps-trunk-r0.mssi
|
| | | |/
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
replace all rules about aee_aed with crash_dump
Change-Id: I961afb2ed493860166694bca6b636635053c723d
CR-Id: ALPS04991295
Feature: Android Exception Engine(AEE)
|
| | |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
AOSP/1242251 add allow rule for inode2filename.
[Solution]
Modify neverallow rule of system_data_file dir to exclude inode2filename.
Change-Id: I1794bbd1f5d66f0c134dcbbf86abdf30eb096b2b
CR-Id: ALPS05025613
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |\ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
1. add aee hidl selinux rules
Change-Id: I5a04c096d394735a4d928fd6a022f9ffc22e72fd
CR-Id: ALPS04975618
Feature: Android Exception Engine(AEE)
|
| | |\ \
| | | |
| | | |
| | | | |
alps-trunk-r0.mssi
|
| | | |/
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Detail]
In AOSP/1097032 and AOSP/1128792, there are new attributes and neverallow
rules with property.
The MTK sepolicies of properties need some modification for them.
[Solution]
Modify MTK sepolicies of properties.
Change-Id: I0a78d4e974d57c6d328991a791918ffa6a12008b
CR-Id: ALPS05014766
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |/
| |
| |
| |
| |
| |
| |
| | |
Add permission for system_server to access hctosys
Change-Id: I9e18cff8ebc2836ed223424b526e9247ce4e3be8
CR-Id: ALPS04890169
Feature: Power-Off Alarm
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
BASIC and BSP project should have same sepolicies in basic/.
[Solution]
1.Modify SEPolicies in non_plat/ by comparing with r_non_plat/ .
2.Remove r_non_plat/ .
Change-Id: I24d3df00255779bd73f4075c1c4062176d5b6047
CR-Id: ALPS05009976
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
mmstat tracer needs to be enabled by vendor init through the creation
of an instance in the tracing directory. To allow this operation, some
proper rules should be added.
Change-Id: I83ed630af0bc927a60581e9ad9e80ba52b07b7bf
CR-Id: ALPS04956865
Feature: [Module]Kernel Memory Management
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Error]
domain.te violated by allow iorap_inode2filename system_data_file:dir { read open };
domain.te violated by allow iorap_inode2filename system_data_file:lnk_file { read open };
[Detail]
This patch add iorap_inode2filename neverallow rule for system_data access
Change-Id: If7205f19f0d6b18705182eb90036ca7482407157
CR-Id: ALPS04971420
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Error]
domain.te violated by allow iorap_inode2filename system_data_file:dir { read open };
domain.te violated by allow iorap_inode2filename system_data_file:lnk_file { read open };
[Detail]
This patch add iorap_inode2filename neverallow rule for system_data access
Change-Id: I0456dc3a73459ec45026ca4eec81cc89f636671c
CR-Id: ALPS04971420
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |\ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
1. mnt_expand_file no getattr selinux rule
Change-Id: I14a31e6b4f778270ae1a684a5c1ea1407f4d6786
CR-Id: ALPS04975618
Feature: Android Exception Engine(AEE)
|
| | |\ \
| | |/
| |/|
| | | |
alps-trunk-r0.basic
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
add power_supply class support
Change-Id: I5292bf629f37049a4fddd29990a5643d49dee0a7
CR-Id: ALPS04885863
Feature: Charger
|
| | |\ \
| | |/
| |/|
| | | |
alps-trunk-r0.basic
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
1. allow crash_dump to read/write /data/aee_exp
2. add mlstrustedobject attribute
3. use rw_dir_perms/create_file_perms to replace open/write...
Change-Id: I05ec01fbf54d1d797675918c962dc0b5c3828755
CR-Id: ALPS04991295
Feature: Android Exception Engine(AEE)
|
| | |/
| |
| |
| |
| |
| |
| |
| |
| | |
[META]
Read new device tree node to get boot/meta info
Change-Id: I04a427e8fefdc44ead9a5f36c8bc663623994020
CR-Id: ALPS04995993
Feature: SP META Tool
|
| | |\ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[META]
Read new device tree node to get boot/meta info
Request permission to read it
Change-Id: Ifcddf34ea2ee1efd09e3498010fffd7122c0d93e
CR-Id: ALPS04995993
Feature: SP META Tool
|
| | |\ \
| | | |
| | | |
| | | | |
alps-trunk-r0.basic
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
1. allow aee_aedv to read or write proc file
Change-Id: Ic16afcc2080d91a22de2440a2eb12838f71e7b9b
CR-Id: ALPS04975618
Feature: Android Exception Engine(AEE)
|
| | |\ \ \
| | |_|/
| |/| | |
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Add policy for stp_dump3
Change-Id: Iea1fa6b8c1c25fb69cda010f7a449e5ea3ee109f
Signed-off-by: Tim Chang <tim.chang@mediatek.com>
CR-Id: ALPS04949825
Feature: [Module]WMT Driver
|
| | | |/
| |/|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Detail]
aosp/1217340 add allow rule for apexd which belongs to
init process.
[Solution]
Modify neverallow rule of system_data_file dir to exclude apexd.
Change-Id: I3b57ee2e0a338c6427825467812b767abb696dcd
CR-Id: ALPS04994589
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |\ \
| | | |
| | | |
| | | | |
alps-trunk-r0.basic
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
add power_supply class support
Change-Id: Ib640a5e6eb1cb9bc2e0693b446c6fc7f9bb25972
Signed-off-by: Timo Liao <timo.liao@mediatek.com>
CR-Id: ALPS04984342
Feature: Fuel Gauge
|
| | |\ \ \
| | |_|/
| |/| |
| | | | |
alps-trunk-r0.basic
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
regexp to better support mulitple variant context
Bug: 139134043
Test: DeviceManifest/SingleManifestTest.InterfacesAreReleased
Test: MediaDrmClearkeyTest
Change-Id: Iba8cbb5570b0731746857ba9f9ac578e2c95e450
CR-Id: ALPS04971420
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
dumpstate: grant dumpstate getattr to /dev/usb-ffs
Change-Id: I004c14563e743a8043ee1c302df5b60af37e895b
Signed-off-by: Macpaul Lin <macpaul.lin@mediatek.com>
CR-Id: ALPS04915601
Feature: [Module]USB 2.0
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Error]
domain.te
violated by allow apexd system_data_file:dir
{ ioctl read lock open watch watch_reads };
[Detail]
aosp/1217340 add allow rule for apexd which belongs to
init process. We remove the neverallow rule in R to
workaround it first.
Change-Id: Idc20eea53dc4fd1db11c16ebf4a7924be4ae4c4d
CR-Id: ALPS04971420
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Error]
neverallow on netd.te
violated by allow netd kernel:system { module_request };
violated by allow netd netd:capability { sys_module };
[Detail]
Remove rule to prevent build break
Change-Id: If4d7f63e2e11d054e4fd65a258fd135ed02e1d36
CR-Id: ALPS04971420
Feature: build process
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Allow rild to access MUXD property.
Change-Id: I3a373cf8bef1da965eda3063e74670302f2cbf0c
CR-Id: ALPS04968107
Feature: DSDS (Dual SIM Dual Standby) Framework-Common Framework(RIL)
(cherry picked from commit b6c41fe738e7f1c27dc21c64c193f07670fb8044)
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Detail]
There is a mistake when fixing build error:
should remove:
set_prop(gsm0710muxd, ctl_rildaemon_prop)
but not:
set_prop(gsm0710muxd, gsm0710muxd_prop)
[Solution]
Modify this mistake.
Change-Id: Ib4a9289bab07935af659de8e807f5480f998aad4
CR-Id: ALPS04979747
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
[Detail]
Do not allow access to the generic vendor_data_file label. This is too broad.
Instead, if access to part of vendor_data_file is desired, it should have a
more specific label.
[Solution]
1.Add neverallow rule for vendor_data_file.
2.Remove the conflicting SEPolicies.
Change-Id: Ib50df894093aa26b6e8517b4a6ebb24eb4ade6f4
CR-Id: ALPS04978995
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Do not allow access to the generic system_data_file label. This is too broad.
Instead, if access to part of system_data_file is desired, it should have a
more specific label.
[Solution]
1.Add neverallow rule for system_data_file.
2.Remove the conflicting SEPolicies.
Change-Id: Ifc5a87d55b7ca18a53dd6ffe1fbccaf63e03e263
CR-Id: ALPS04974468
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Do not allow access to the generic debugfs label. This is too broad.
Instead, if access to part of debugfs is desired, it should have a
more specific label.
[Solution]
1.Add neverallow rule for debugfs.
2.Remove the conflicting SEPolicies.
Change-Id: Ib4dc4f57448ad52459f5d62a4ddedab94412cc96
CR-Id: ALPS04970566
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |\
| | |
| | |
| | | |
sysfs_mmcblk_block" into alps-trunk-r0.basic
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
label with sysfs_mmcblk_block
replace sysfs_mmcblk selinux label with
sysfs_mmcblk_block to prevent vold's
permission denied warning message
Change-Id: Ib17a830434ae72de2bf40445415dad98464b1372
CR-Id: ALPS04961200
Feature: [Android Default] SIU (SD Image Update)
|
| | |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Do not allow access to the generic proc label. This is too broad.
Instead, if access to part of proc is desired, it should have a
more specific label.
TODO: Remove mtk_hal_audio/audioserver and so on once there are no violations.
EX.
r_dir_file(hal_audio, proc)
hal_server_domain(mtk_hal_audio, hal_audio)
hal_client_domain(audioserver, hal_audio)
[Solution]
1.Add neverallow rule for proc.
2.Remove the conflicting SEPolicies.
Change-Id: Ie932149f8c642d4a05152117f1166daeaf9b2cff
CR-Id: ALPS04967689
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
The mode of sepolicy files should be -rw-r--r--,
and the type should be ASCII text with Unix/Linux format.
[Solution]
1.Use 'chmod 0644' to change sepolicy files' mode.
2.Use 'iconv -t ASCII' and 'dos2unix' to change sepolicy files'
type and format.
Change-Id: Iac13b1ea8a4546168f68a7918acdcdb0588f6630
CR-Id: ALPS04968083
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Do not allow access to the generic sysfs label. This is too broad.
Instead, if access to part of sysfs is desired, it should have a
more specific label.
TODO: Remove hal_usb/mtk_hal_usb and so on once there are no violations.
EX.
allow hal_usb sysfs:file write;
hal_server_domain(mtk_hal_usb, hal_usb)
r_dir_file(hal_wifi, sysfs_type)
hal_server_domain(mtk_hal_wifi, hal_wifi)
[Solution]
1.Add neverallow rule for sysfs.
2.Remove the conflicting SEPolicies.
Change-Id: I304a1a87b23623e320ff7346da9d10a09264152b
CR-Id: ALPS04967419
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|
| | |
| |
| |
| |
| |
| |
| |
| | |
Remove unused selinux prop
Change-Id: I62f548043156abc54c1e8f36aea94bd31aacbc42
CR-Id: ALPS04962211
Feature: Engineering Mode
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Add the new path for regulator-vibrator driver
Change-Id: I6d63442e7bc859630035265a35b5e8651635a398
CR-Id: ALPS04248635
Feature: [Module]Vibrator
(cherry picked from commit fc460909faba8ab1d940b30413f50612d543df33)
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
[Detail]
Some restrictions have been added in Android R by Google,
need to modify the conflicting SEPolicies of MTK.
[Solution]
Remove the conflicting SEPolicies.
CR-Id: ALPS04961644
Change-Id: Ic3c27729f8d21929be74b62b353cc2db376c75d7
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
|