summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Automated merge of MTK Keystone code for 2020_03_30android-mainline-11.0.0_r44android-mainline-11.0.0_r43android-mainline-11.0.0_r42android-mainline-11.0.0_r41android-mainline-11.0.0_r40android-mainline-11.0.0_r39android-mainline-11.0.0_r38android-mainline-11.0.0_r37android-mainline-11.0.0_r36android-mainline-11.0.0_r35android-mainline-11.0.0_r34android-mainline-11.0.0_r32android-mainline-11.0.0_r31android-mainline-11.0.0_r30android-mainline-11.0.0_r28android-mainline-11.0.0_r27android-mainline-11.0.0_r26android-mainline-11.0.0_r25android-mainline-11.0.0_r24android-mainline-11.0.0_r23android-mainline-11.0.0_r22android-mainline-11.0.0_r21android-mainline-11.0.0_r20android-mainline-11.0.0_r18android-mainline-11.0.0_r17android-mainline-11.0.0_r16android-mainline-11.0.0_r15android-mainline-11.0.0_r14android-mainline-11.0.0_r13android-mainline-11.0.0_r12android11-mainline-tethering-releaseandroid11-mainline-permission-releaseandroid11-mainline-os-statsd-releaseandroid11-mainline-networkstack-releaseandroid11-mainline-media-swcodec-releaseandroid11-mainline-media-releaseandroid11-mainline-extservices-releaseandroid11-mainline-documentsui-releaseandroid11-mainline-conscrypt-releaseandroid11-mainline-cellbroadcast-releaseandroid11-mainline-captiveportallogin-releaseandroid11-devGreg Kaiser2020-03-3038-704/+726
|\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bug: 151102302 Test: Section 6 in vendor/mediatek/build/wembley_tools/merge_process.txt * commit '0798bcf47bb0fb9796548032b0766f6444798a91': (827 commits) [ALPS05003224] thermal hal service sepolicy [ALPS04958679] EM:remove phone UID [ALPS04991295] relable aee_aed/aee_aed64 to crash_dump [ALPS05025613] SEPolicy: Modify neverallow rule for system_data_file [ALPS05014766] SEPolicy: Modify property with new attributes [ALPS04890169] RTC: add permission for system_server [ALPS04975618] add aee hidl service [ALPS05009976] SEPolicy: Merge folder non_plat and r_non_plat [ALPS04956865] mmstat: allow vendor to access tracing instances [ALPS04971420] sepolicy: add inode2filename neverallow rule [ALPS04971420] sepolicy: add inode2filename neverallow rule [ALPS04885863] charger: add power_supply class support [ALPS04975618] fix dumpstate xTS fail [ALPS04995993] [META]Connect META failed [ALPS04991295] create minicoredump/coredump fail [ALPS04995993] [META]Failed to connect meta [ALPS04975618] add aee_aedv proc file selinux rule [ALPS04949825] WMT: add sepolicy [ALPS04994589] SEPolicy: Modify neverallow rule for system_data_file [ALPS04984342] battery: add power_supply class support ... Change-Id: If97bc5bb23fabad7f62efcdbda3a3fa0ba7ec307
| * Merge "[ALPS05003224] thermal hal service sepolicy" into alps-trunk-r0.mssiHenry Huang2020-03-112-0/+9
| |\
| | * [ALPS05003224] thermal hal service sepolicyhenry huang2020-03-112-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | add sepolicy for thermal hal 2.0 service Change-Id: Id6cbab5e82ceb415febe76e0ed16b930ec4a8b47 CR-Id: ALPS05003224 Feature: Thermal Management
| * | [ALPS04958679] EM:remove phone UIDyuhui.zhang2020-03-103-158/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] 1. Move em hidl definition from non_plat to public 2. Remove EM sepolicy rules from radio.te Change-Id: Id818343a3d7d3a24e425b38aed697e46994b8a93 CR-Id: ALPS04958679 Feature: Engineering Mode
| * | Merge "[ALPS04991295] relable aee_aed/aee_aed64 to crash_dump" into ↵Larry Liang2020-03-1017-218/+206
| |\ \ | | | | | | | | | | | | alps-trunk-r0.mssi
| | * | [ALPS04991295] relable aee_aed/aee_aed64 to crash_dumpmtk112852020-03-0917-218/+206
| | |/ | | | | | | | | | | | | | | | | | | | | | replace all rules about aee_aed with crash_dump Change-Id: I961afb2ed493860166694bca6b636635053c723d CR-Id: ALPS04991295 Feature: Android Exception Engine(AEE)
| * / [ALPS05025613] SEPolicy: Modify neverallow rule for system_data_fileShanshan Guo2020-03-072-239/+239
| |/ | | | | | | | | | | | | | | | | | | | | | | [Detail] AOSP/1242251 add allow rule for inode2filename. [Solution] Modify neverallow rule of system_data_file dir to exclude inode2filename. Change-Id: I1794bbd1f5d66f0c134dcbbf86abdf30eb096b2b CR-Id: ALPS05025613 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * Merge "[ALPS04975618] add aee hidl service" into alps-trunk-r0.mssiLarry Liang2020-03-067-4/+16
| |\
| | * [ALPS04975618] add aee hidl serviceHuaiming Li2020-03-047-4/+16
| | | | | | | | | | | | | | | | | | | | | | | | 1. add aee hidl selinux rules Change-Id: I5a04c096d394735a4d928fd6a022f9ffc22e72fd CR-Id: ALPS04975618 Feature: Android Exception Engine(AEE)
| * | Merge "[ALPS05014766] SEPolicy: Modify property with new attributes" into ↵Shanshan Guo2020-03-055-372/+306
| |\ \ | | | | | | | | | | | | alps-trunk-r0.mssi
| | * | [ALPS05014766] SEPolicy: Modify property with new attributesShanshan Guo2020-03-055-372/+306
| | |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] In AOSP/1097032 and AOSP/1128792, there are new attributes and neverallow rules with property. The MTK sepolicies of properties need some modification for them. [Solution] Modify MTK sepolicies of properties. Change-Id: I0a78d4e974d57c6d328991a791918ffa6a12008b CR-Id: ALPS05014766 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * / [ALPS04890169] RTC: add permission for system_serverandrew.yang2020-03-041-0/+1
| |/ | | | | | | | | | | | | | | Add permission for system_server to access hctosys Change-Id: I9e18cff8ebc2836ed223424b526e9247ce4e3be8 CR-Id: ALPS04890169 Feature: Power-Off Alarm
| * [ALPS05009976] SEPolicy: Merge folder non_plat and r_non_platShanshan Guo2020-02-29160-10752/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] BASIC and BSP project should have same sepolicies in basic/. [Solution] 1.Modify SEPolicies in non_plat/ by comparing with r_non_plat/ . 2.Remove r_non_plat/ . Change-Id: I24d3df00255779bd73f4075c1c4062176d5b6047 CR-Id: ALPS05009976 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04956865] mmstat: allow vendor to access tracing instancesChinwen Chang2020-02-261-0/+4
| | | | | | | | | | | | | | | | | | | | mmstat tracer needs to be enabled by vendor init through the creation of an instance in the tracing directory. To allow this operation, some proper rules should be added. Change-Id: I83ed630af0bc927a60581e9ad9e80ba52b07b7bf CR-Id: ALPS04956865 Feature: [Module]Kernel Memory Management
| * [ALPS04971420] sepolicy: add inode2filename neverallow ruleJuju Sung2020-02-242-239/+239
| | | | | | | | | | | | | | | | | | | | | | | | | | [Error] domain.te violated by allow iorap_inode2filename system_data_file:dir { read open }; domain.te violated by allow iorap_inode2filename system_data_file:lnk_file { read open }; [Detail] This patch add iorap_inode2filename neverallow rule for system_data access Change-Id: If7205f19f0d6b18705182eb90036ca7482407157 CR-Id: ALPS04971420 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04971420] sepolicy: add inode2filename neverallow ruleJuju Sung2020-02-242-0/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | [Error] domain.te violated by allow iorap_inode2filename system_data_file:dir { read open }; domain.te violated by allow iorap_inode2filename system_data_file:lnk_file { read open }; [Detail] This patch add iorap_inode2filename neverallow rule for system_data access Change-Id: I0456dc3a73459ec45026ca4eec81cc89f636671c CR-Id: ALPS04971420 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * Merge "[ALPS04975618] fix dumpstate xTS fail" into alps-trunk-r0.basicLarry Liang2020-02-212-2/+2
| |\
| | * [ALPS04975618] fix dumpstate xTS failHuaiming Li2020-02-202-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | 1. mnt_expand_file no getattr selinux rule Change-Id: I14a31e6b4f778270ae1a684a5c1ea1407f4d6786 CR-Id: ALPS04975618 Feature: Android Exception Engine(AEE)
| * | Merge "[ALPS04885863] charger: add power_supply class support" into ↵Elvin Lin2020-02-202-0/+2
| |\ \ | | |/ | |/| | | | alps-trunk-r0.basic
| | * [ALPS04885863] charger: add power_supply class supportIvan-YH Chen2020-02-202-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | add power_supply class support Change-Id: I5292bf629f37049a4fddd29990a5643d49dee0a7 CR-Id: ALPS04885863 Feature: Charger
| * | Merge "[ALPS04991295] create minicoredump/coredump fail" into ↵Chunhui Li2020-02-204-5/+7
| |\ \ | | |/ | |/| | | | alps-trunk-r0.basic
| | * [ALPS04991295] create minicoredump/coredump failmtk112852020-02-184-5/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 1. allow crash_dump to read/write /data/aee_exp 2. add mlstrustedobject attribute 3. use rw_dir_perms/create_file_perms to replace open/write... Change-Id: I05ec01fbf54d1d797675918c962dc0b5c3828755 CR-Id: ALPS04991295 Feature: Android Exception Engine(AEE)
| * | [ALPS04995993] [META]Connect META failedjing.li2020-02-186-0/+33
| |/ | | | | | | | | | | | | | | | | [META] Read new device tree node to get boot/meta info Change-Id: I04a427e8fefdc44ead9a5f36c8bc663623994020 CR-Id: ALPS04995993 Feature: SP META Tool
| * Merge "[ALPS04995993] [META]Failed to connect meta" into alps-trunk-r0.basicGang Wei2020-02-141-0/+5
| |\
| | * [ALPS04995993] [META]Failed to connect metajing.li2020-02-141-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [META] Read new device tree node to get boot/meta info Request permission to read it Change-Id: Ifcddf34ea2ee1efd09e3498010fffd7122c0d93e CR-Id: ALPS04995993 Feature: SP META Tool
| * | Merge "[ALPS04975618] add aee_aedv proc file selinux rule" into ↵Junjie Hu2020-02-146-0/+12
| |\ \ | | | | | | | | | | | | alps-trunk-r0.basic
| | * | [ALPS04975618] add aee_aedv proc file selinux ruleHuaiming Li2020-02-146-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 1. allow aee_aedv to read or write proc file Change-Id: Ic16afcc2080d91a22de2440a2eb12838f71e7b9b CR-Id: ALPS04975618 Feature: Android Exception Engine(AEE)
| * | | Merge "[ALPS04949825] WMT: add sepolicy" into alps-trunk-r0.basicWilly Yu2020-02-142-0/+4
| |\ \ \ | | |_|/ | |/| |
| | * | [ALPS04949825] WMT: add sepolicyTim Chang2020-02-132-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add policy for stp_dump3 Change-Id: Iea1fa6b8c1c25fb69cda010f7a449e5ea3ee109f Signed-off-by: Tim Chang <tim.chang@mediatek.com> CR-Id: ALPS04949825 Feature: [Module]WMT Driver
| * | | [ALPS04994589] SEPolicy: Modify neverallow rule for system_data_fileShanshan Guo2020-02-131-126/+129
| | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] aosp/1217340 add allow rule for apexd which belongs to init process. [Solution] Modify neverallow rule of system_data_file dir to exclude apexd. Change-Id: I3b57ee2e0a338c6427825467812b767abb696dcd CR-Id: ALPS04994589 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * | Merge "[ALPS04984342] battery: add power_supply class support" into ↵Wy Chuang2020-02-112-0/+2
| |\ \ | | | | | | | | | | | | alps-trunk-r0.basic
| | * | [ALPS04984342] battery: add power_supply class supportTimo Liao2020-02-102-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | add power_supply class support Change-Id: Ib640a5e6eb1cb9bc2e0693b446c6fc7f9bb25972 Signed-off-by: Timo Liao <timo.liao@mediatek.com> CR-Id: ALPS04984342 Feature: Fuel Gauge
| * | | Merge "[ALPS04971420] Update drm service executables file_contexts" into ↵Juju Sung2020-02-072-8/+8
| |\ \ \ | | |_|/ | |/| | | | | | alps-trunk-r0.basic
| | * | [ALPS04971420] Update drm service executables file_contextsJuju Sung2020-02-052-8/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | regexp to better support mulitple variant context Bug: 139134043 Test: DeviceManifest/SingleManifestTest.InterfacesAreReleased Test: MediaDrmClearkeyTest Change-Id: Iba8cbb5570b0731746857ba9f9ac578e2c95e450 CR-Id: ALPS04971420 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * | | [ALPS04915601] dumpstate: grant dumpstate getattr to /dev/usb-ffsMacpaul Lin2020-02-042-0/+6
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | dumpstate: grant dumpstate getattr to /dev/usb-ffs Change-Id: I004c14563e743a8043ee1c302df5b60af37e895b Signed-off-by: Macpaul Lin <macpaul.lin@mediatek.com> CR-Id: ALPS04915601 Feature: [Module]USB 2.0
| * | [ALPS04971420] SELIUX: remove system_data_file ruleJuju Sung2020-01-301-126/+126
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Error] domain.te violated by allow apexd system_data_file:dir { ioctl read lock open watch watch_reads }; [Detail] aosp/1217340 add allow rule for apexd which belongs to init process. We remove the neverallow rule in R to workaround it first. Change-Id: Idc20eea53dc4fd1db11c16ebf4a7924be4ae4c4d CR-Id: ALPS04971420 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * | [ALPS04971420] SELIUX: remove netd sys_module ruleJuju Sung2020-01-261-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Error] neverallow on netd.te violated by allow netd kernel:system { module_request }; violated by allow netd netd:capability { sys_module }; [Detail] Remove rule to prevent build break Change-Id: If4d7f63e2e11d054e4fd65a258fd135ed02e1d36 CR-Id: ALPS04971420 Feature: build process
| * | [ALPS04968107] Error handling for RILD auto-restartCosmo Sung2020-01-211-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | Allow rild to access MUXD property. Change-Id: I3a373cf8bef1da965eda3063e74670302f2cbf0c CR-Id: ALPS04968107 Feature: DSDS (Dual SIM Dual Standby) Framework-Common Framework(RIL) (cherry picked from commit b6c41fe738e7f1c27dc21c64c193f07670fb8044)
| * | [ALPS04979747] SEPolicy: Fix mistake for BASIC projectShanshan Guo2020-01-201-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] There is a mistake when fixing build error: should remove: set_prop(gsm0710muxd, ctl_rildaemon_prop) but not: set_prop(gsm0710muxd, gsm0710muxd_prop) [Solution] Modify this mistake. Change-Id: Ib4a9289bab07935af659de8e807f5480f998aad4 CR-Id: ALPS04979747 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * | [ALPS04978995] SEPolicy: Add neverallow rule for vendor_data_fileShanshan Guo2020-01-207-26/+42
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Do not allow access to the generic vendor_data_file label. This is too broad. Instead, if access to part of vendor_data_file is desired, it should have a more specific label. [Solution] 1.Add neverallow rule for vendor_data_file. 2.Remove the conflicting SEPolicies. Change-Id: Ib50df894093aa26b6e8517b4a6ebb24eb4ade6f4 CR-Id: ALPS04978995 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * | [ALPS04974468] SEPolicy: Add neverallow rule for system_data_fileShanshan Guo2020-01-1942-157/+316
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Do not allow access to the generic system_data_file label. This is too broad. Instead, if access to part of system_data_file is desired, it should have a more specific label. [Solution] 1.Add neverallow rule for system_data_file. 2.Remove the conflicting SEPolicies. Change-Id: Ifc5a87d55b7ca18a53dd6ffe1fbccaf63e03e263 CR-Id: ALPS04974468 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04970566] SEPolicy: Add neverallow rule for debugfsShanshan Guo2020-01-139-27/+33
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Do not allow access to the generic debugfs label. This is too broad. Instead, if access to part of debugfs is desired, it should have a more specific label. [Solution] 1.Add neverallow rule for debugfs. 2.Remove the conflicting SEPolicies. Change-Id: Ib4dc4f57448ad52459f5d62a4ddedab94412cc96 CR-Id: ALPS04970566 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * Merge "[ALPS04961200] recovery: replace sysfs_mmcblk selinux label with ↵Chang-An Chen2020-01-136-17/+17
| |\ | | | | | | | | | sysfs_mmcblk_block" into alps-trunk-r0.basic
| | * [ALPS04961200] recovery: replace sysfs_mmcblk selinuxFreddy Hsin2020-01-126-17/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | label with sysfs_mmcblk_block replace sysfs_mmcblk selinux label with sysfs_mmcblk_block to prevent vold's permission denied warning message Change-Id: Ib17a830434ae72de2bf40445415dad98464b1372 CR-Id: ALPS04961200 Feature: [Android Default] SIU (SD Image Update)
| * | [ALPS04967689] SEPolicy: Add neverallow rule for procShanshan Guo2020-01-1129-113/+154
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Do not allow access to the generic proc label. This is too broad. Instead, if access to part of proc is desired, it should have a more specific label. TODO: Remove mtk_hal_audio/audioserver and so on once there are no violations. EX. r_dir_file(hal_audio, proc) hal_server_domain(mtk_hal_audio, hal_audio) hal_client_domain(audioserver, hal_audio) [Solution] 1.Add neverallow rule for proc. 2.Remove the conflicting SEPolicies. Change-Id: Ie932149f8c642d4a05152117f1166daeaf9b2cff CR-Id: ALPS04967689 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04968083] SEPolicy: Modify sepolicy files' mode and typeShanshan Guo2020-01-1138-190/+190
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] The mode of sepolicy files should be -rw-r--r--, and the type should be ASCII text with Unix/Linux format. [Solution] 1.Use 'chmod 0644' to change sepolicy files' mode. 2.Use 'iconv -t ASCII' and 'dos2unix' to change sepolicy files' type and format. Change-Id: Iac13b1ea8a4546168f68a7918acdcdb0588f6630 CR-Id: ALPS04968083 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04967419] SEPolicy: Add neverallow rule for sysfsShanshan Guo2020-01-1039-86/+198
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Do not allow access to the generic sysfs label. This is too broad. Instead, if access to part of sysfs is desired, it should have a more specific label. TODO: Remove hal_usb/mtk_hal_usb and so on once there are no violations. EX. allow hal_usb sysfs:file write; hal_server_domain(mtk_hal_usb, hal_usb) r_dir_file(hal_wifi, sysfs_type) hal_server_domain(mtk_hal_wifi, hal_wifi) [Solution] 1.Add neverallow rule for sysfs. 2.Remove the conflicting SEPolicies. Change-Id: I304a1a87b23623e320ff7346da9d10a09264152b CR-Id: ALPS04967419 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
| * [ALPS04962211] [EM] remove unused selinux propJuan Rong2020-01-104-16/+0
| | | | | | | | | | | | | | | | Remove unused selinux prop Change-Id: I62f548043156abc54c1e8f36aea94bd31aacbc42 CR-Id: ALPS04962211 Feature: Engineering Mode
| * [ALPS04248635] Vibrator: add the new path for drivermtk147232020-01-072-1/+2
| | | | | | | | | | | | | | | | | | | | [Detail] Add the new path for regulator-vibrator driver Change-Id: I6d63442e7bc859630035265a35b5e8651635a398 CR-Id: ALPS04248635 Feature: [Module]Vibrator (cherry picked from commit fc460909faba8ab1d940b30413f50612d543df33)
| * [ALPS04961644] SEPolicy: Fix build error for Android RShanshan Guo2020-01-0710-20/+21
| | | | | | | | | | | | | | | | | | | | | | | | | | [Detail] Some restrictions have been added in Android R by Google, need to modify the conflicting SEPolicies of MTK. [Solution] Remove the conflicting SEPolicies. CR-Id: ALPS04961644 Change-Id: Ic3c27729f8d21929be74b62b353cc2db376c75d7 Feature: [Android Default] SELinux, SEAndroid, and SE-MTK