<feed xmlns='http://www.w3.org/2005/Atom'>
<title>device_mediatek_wembley-sepolicy/non_plat/cameraserver.te, branch android11-mainline-release</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/'/>
<entry>
<title>[ALPS05009976] SEPolicy: Merge folder non_plat and r_non_plat</title>
<updated>2020-02-29T04:02:13+00:00</updated>
<author>
<name>Shanshan Guo</name>
<email>Shanshan.Guo@mediatek.com</email>
</author>
<published>2020-02-29T04:02:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=8c2ce28a36be318fd5ff2e224b2fb0dfc25f3d6e'/>
<id>8c2ce28a36be318fd5ff2e224b2fb0dfc25f3d6e</id>
<content type='text'>
[Detail]
BASIC and BSP project should have same sepolicies in basic/.

[Solution]
1.Modify SEPolicies in non_plat/ by comparing with r_non_plat/ .
2.Remove r_non_plat/ .

Change-Id: I24d3df00255779bd73f4075c1c4062176d5b6047
CR-Id: ALPS05009976
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
BASIC and BSP project should have same sepolicies in basic/.

[Solution]
1.Modify SEPolicies in non_plat/ by comparing with r_non_plat/ .
2.Remove r_non_plat/ .

Change-Id: I24d3df00255779bd73f4075c1c4062176d5b6047
CR-Id: ALPS05009976
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04974468] SEPolicy: Add neverallow rule for system_data_file</title>
<updated>2020-01-19T08:01:11+00:00</updated>
<author>
<name>Shanshan Guo</name>
<email>Shanshan.Guo@mediatek.com</email>
</author>
<published>2020-01-19T05:44:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=c35db1e5a50c311dfcca91618d7221bde6961e1b'/>
<id>c35db1e5a50c311dfcca91618d7221bde6961e1b</id>
<content type='text'>
[Detail]
Do not allow access to the generic system_data_file label. This is too broad.
Instead, if access to part of system_data_file is desired, it should have a
more specific label.

[Solution]
1.Add neverallow rule for system_data_file.
2.Remove the conflicting SEPolicies.

Change-Id: Ifc5a87d55b7ca18a53dd6ffe1fbccaf63e03e263
CR-Id: ALPS04974468
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
Do not allow access to the generic system_data_file label. This is too broad.
Instead, if access to part of system_data_file is desired, it should have a
more specific label.

[Solution]
1.Add neverallow rule for system_data_file.
2.Remove the conflicting SEPolicies.

Change-Id: Ifc5a87d55b7ca18a53dd6ffe1fbccaf63e03e263
CR-Id: ALPS04974468
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04967689] SEPolicy: Add neverallow rule for proc</title>
<updated>2020-01-11T13:58:41+00:00</updated>
<author>
<name>Shanshan Guo</name>
<email>Shanshan.Guo@mediatek.com</email>
</author>
<published>2020-01-11T13:58:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=4efc2b137c71b2b200e58bfa45c842290929caa4'/>
<id>4efc2b137c71b2b200e58bfa45c842290929caa4</id>
<content type='text'>
[Detail]
Do not allow access to the generic proc label. This is too broad.
Instead, if access to part of proc is desired, it should have a
more specific label.
TODO: Remove mtk_hal_audio/audioserver and so on once there are no violations.
EX.
   r_dir_file(hal_audio, proc)
   hal_server_domain(mtk_hal_audio, hal_audio)
   hal_client_domain(audioserver, hal_audio)

[Solution]
1.Add neverallow rule for proc.
2.Remove the conflicting SEPolicies.

Change-Id: Ie932149f8c642d4a05152117f1166daeaf9b2cff
CR-Id: ALPS04967689
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
Do not allow access to the generic proc label. This is too broad.
Instead, if access to part of proc is desired, it should have a
more specific label.
TODO: Remove mtk_hal_audio/audioserver and so on once there are no violations.
EX.
   r_dir_file(hal_audio, proc)
   hal_server_domain(mtk_hal_audio, hal_audio)
   hal_client_domain(audioserver, hal_audio)

[Solution]
1.Add neverallow rule for proc.
2.Remove the conflicting SEPolicies.

Change-Id: Ie932149f8c642d4a05152117f1166daeaf9b2cff
CR-Id: ALPS04967689
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04639771] SEPolicy: Modify workaround</title>
<updated>2019-06-14T08:39:30+00:00</updated>
<author>
<name>Shanshan Guo</name>
<email>Shanshan.Guo@mediatek.com</email>
</author>
<published>2019-06-14T07:50:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=5a2b7e3fdc826a7ca6bc70a3810f14c1661e7d79'/>
<id>5a2b7e3fdc826a7ca6bc70a3810f14c1661e7d79</id>
<content type='text'>
[Detail]
There is a workaround for bring-up,
now it needs to be modified.

[Solution]
1.Split workaround to sepcial *.te
2.Modify ged sepolicy
3.Modify mistake
4.Add sepolicy

Change-Id: I0894de45e014a5eae754e35b57fbc9b21bc4bf90
CR-Id: ALPS04639771
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
There is a workaround for bring-up,
now it needs to be modified.

[Solution]
1.Split workaround to sepcial *.te
2.Modify ged sepolicy
3.Modify mistake
4.Add sepolicy

Change-Id: I0894de45e014a5eae754e35b57fbc9b21bc4bf90
CR-Id: ALPS04639771
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04566986] Fix cameraserver permission</title>
<updated>2019-06-04T07:42:35+00:00</updated>
<author>
<name>Cheng Li</name>
<email>Cheng.Li@mediatek.com</email>
</author>
<published>2019-06-04T07:03:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=01b85f4aed18628c9053fde9f4a2fd96509d49ec'/>
<id>01b85f4aed18628c9053fde9f4a2fd96509d49ec</id>
<content type='text'>
[Detail]
allow permission of ioctl for cameraserver

[Solution]

Change-Id: Icddcd0e5eb51583d65aca6763d4b2f31683ffd7f
CR-Id: ALPS04566986
Feature: [Android Default] Camera Application Basic Functions
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
allow permission of ioctl for cameraserver

[Solution]

Change-Id: Icddcd0e5eb51583d65aca6763d4b2f31683ffd7f
CR-Id: ALPS04566986
Feature: [Android Default] Camera Application Basic Functions
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04328846] power: refine sepolicy</title>
<updated>2019-05-22T09:48:45+00:00</updated>
<author>
<name>Ian-Y Chen</name>
<email>ian-y.chen@mediatek.com</email>
</author>
<published>2019-05-22T09:47:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=91ef99a47ee2de3c48426298c9a67d5e4dd10a6b'/>
<id>91ef99a47ee2de3c48426298c9a67d5e4dd10a6b</id>
<content type='text'>
[Detail]
1. Add prefix PERFMGR for performance related ioctl
2. Add property permission for PowerHAL

Change-Id: I5979aefc7fb110ee540425bc53896babdcac08bd
CR-Id: ALPS04328846
Feature: [Module]PowerHAL
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
1. Add prefix PERFMGR for performance related ioctl
2. Add property permission for PowerHAL

Change-Id: I5979aefc7fb110ee540425bc53896babdcac08bd
CR-Id: ALPS04328846
Feature: [Module]PowerHAL
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04468274] add cameraservice ioctrol permission</title>
<updated>2019-05-17T05:38:41+00:00</updated>
<author>
<name>Cheng Li</name>
<email>Cheng.Li@mediatek.com</email>
</author>
<published>2019-05-16T09:02:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=23fe7f9ba48f0ff2d27acf666670c1d4dba69a6e'/>
<id>23fe7f9ba48f0ff2d27acf666670c1d4dba69a6e</id>
<content type='text'>
[Detail]
add cameraserver permission

[Solution]

Change-Id: Ie4b9aa9cd836a3c96a353a8148e5ada5d21166f8
CR-Id: ALPS04468274
Feature: [Android Default] Camera Application Basic Functions
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
add cameraserver permission

[Solution]

Change-Id: Ie4b9aa9cd836a3c96a353a8148e5ada5d21166f8
CR-Id: ALPS04468274
Feature: [Android Default] Camera Application Basic Functions
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04394576] MT6739:cameraserver sepolicy issue</title>
<updated>2019-04-18T08:20:19+00:00</updated>
<author>
<name>Boru Zhao</name>
<email>boru.zhao@mediatek.com</email>
</author>
<published>2019-04-18T07:08:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=26f6cde989b082ee36067c3e01bdfd1855db046b'/>
<id>26f6cde989b082ee36067c3e01bdfd1855db046b</id>
<content type='text'>
[Detail]
Sepolicy ioctl configure is changed after Q, we modify
cameraserver ioctl configure.

Change-Id: I59489c6ee27a9bb7913d0b49cdaa4e281024cb42
CR-Id: ALPS04394576
Feature: [Android Default] Camera Application Basic Functions
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail]
Sepolicy ioctl configure is changed after Q, we modify
cameraserver ioctl configure.

Change-Id: I59489c6ee27a9bb7913d0b49cdaa4e281024cb42
CR-Id: ALPS04394576
Feature: [Android Default] Camera Application Basic Functions
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge "[ALPS04401451] Fix ioctl permission issue for cameraserver" into alps-trunk-q0.basic</title>
<updated>2019-04-18T03:52:38+00:00</updated>
<author>
<name>Marx Chiu (邱弘志)</name>
<email>marx.chiu@mediatek.com</email>
</author>
<published>2019-04-18T03:52:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=8f58167ddaa5256094a029c9d49c28b843769e58'/>
<id>8f58167ddaa5256094a029c9d49c28b843769e58</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>[ALPS04401451] Fix ioctl permission issue for cameraserver</title>
<updated>2019-04-18T02:13:28+00:00</updated>
<author>
<name>Michael Lai</name>
<email>michael.lai@mediatek.com</email>
</author>
<published>2019-04-17T09:36:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/device_mediatek_wembley-sepolicy/commit/?id=4c7eba0c71d5bb65f244095ca93596b28ba60ad8'/>
<id>4c7eba0c71d5bb65f244095ca93596b28ba60ad8</id>
<content type='text'>
[Detail] Fix the ioctl permission issue for cameraserver

Change-Id: Idca3ad9f37e6aa38375ed008647e81f525a77618
CR-Id: ALPS04401451
Feature: [Android Default] Camera Application Basic Functions
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[Detail] Fix the ioctl permission issue for cameraserver

Change-Id: Idca3ad9f37e6aa38375ed008647e81f525a77618
CR-Id: ALPS04401451
Feature: [Android Default] Camera Application Basic Functions
</pre>
</div>
</content>
</entry>
</feed>
